11.4
0-day

26a66cf0d4dd345800c6695287e2c2d54a70f98892edffcd27c2f9475ac9ca82

b67a8155bd5e9c453bbc8420fa1fe955.exe

分析耗时

81s

最近分析

文件大小

1.3MB
静态报毒 动态报毒 AI SCORE=85 AIDETECTVM ALI2000008 ATTRIBUTE AUTO BACKDOOR@#2VYCE7HUJQXP1 BDYN CLOUD CONFIDENCE GDSDA GEN3 GENERICKD GENERICRXLK HIGH CONFIDENCE HIGHCONFIDENCE HNWWSY MALICIOUS PE MALWARE1 NANOBOT NANOCORE NETWORM NOANCOOE POSSIBLETHREAT RATX SCORE THGAGBO TSCOPE UNSAFE XPACK ZKXK 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee GenericRXLK-QT!B67A8155BD5E 20200725 6.0.6.653
Alibaba Trojan:Win32/vbcrypt.ali2000008 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:RATX-gen [Trj] 20200725 18.4.3895.0
Tencent Win32.Trojan.Inject.Auto 20200725 1.0.0.1
Kingsoft 20200725 2013.8.14.323
CrowdStrike win/malicious_confidence_90% (W) 20190702 1.0
静态指标
Queries for the computername (1 个事件)
Time & API Arguments Status Return Repeated
1619893656.678374
GetComputerNameW
computer_name: OSKAR-PC
success 1 0
Checks if process is being debugged by a debugger (1 个事件)
Time & API Arguments Status Return Repeated
1619893653.475374
IsDebuggerPresent
failed 0 0
Collects information to fingerprint the system (MachineGuid, DigitalProductId, SystemBiosDate) (1 个事件)
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available (1 个事件)
Time & API Arguments Status Return Repeated
1619893656.444374
GlobalMemoryStatusEx
success 1 0
The file contains an unknown PE resource name possibly indicative of a packer (1 个事件)
resource name RED_PILL_THE_TRUTH_REVELATION
One or more processes crashed (50 out of 43662 个事件)
Time & API Arguments Status Return Repeated
1619861122.664626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637220
registers.edi: 1
registers.eax: 1319891379
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 31919439
registers.esi: 42207188
registers.ecx: 31923432
exception.instruction_r: 6f e9 39 07 00 00 64 89 25 00 00 00 00 e9 32 fc
exception.instruction: outsd dx, dword ptr [esi]
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e70591
success 0 0
1619861122.664626
__exception__
stacktrace:

                
            
            
            
registers.esp: 1637208
registers.edi: 1
registers.eax: 1319891379
registers.ebp: 31917363
registers.edx: 31937900
registers.ebx: 1637324
registers.esi: 42207188
registers.ecx: 31923432
exception.instruction_r: 66 6d d8 35 f0 1f b5 93 b9 b8 52 d3 98 5f ba 0b
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e704b8
success 0 0
1619861122.664626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637196
registers.edi: 1
registers.eax: 1319891379
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 31920694
registers.esi: 42207188
registers.ecx: 31923436
exception.instruction_r: ec 4b a6 3f a3 1b 82 a4 b7 74 8f 07 f8 6e e7 80
exception.instruction: in al, dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e71226
success 0 0
1619861122.664626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635392
registers.edi: 0
registers.eax: 3640596269
registers.ebp: 1635456
registers.edx: 2010606285
registers.ebx: 0
registers.esi: 31920713
registers.ecx: 31920694
exception.instruction_r: e7 45 08 24 4b 40 e7 c7 1f 15 8d c0 fa fa 8b be
exception.instruction: out 0x45, eax
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e705b3
success 0 0
1619861122.664626
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635376
registers.edi: 1636072
registers.eax: 16
registers.ebp: 31917173
registers.edx: 2010606285
registers.ebx: 0
registers.esi: 0
registers.ecx: 31920694
exception.instruction_r: e6 f3 65 2e 30 b9 f1 34 81 c0 96 2e 83 a8 62 d5
exception.instruction: out -0xd, al
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e70416
success 0 0
1619861122.664626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635392
registers.edi: 1636072
registers.eax: 16
registers.ebp: 1635456
registers.edx: 2010606285
registers.ebx: 31922550
registers.esi: 0
registers.ecx: 31920694
exception.instruction_r: 66 6f 1e ff dd 9d d8 29 9a 77 5d c8 ff 7c 86 29
exception.instruction: outsw dx, word ptr [esi]
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e718c9
success 0 0
1619861122.664626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637220
registers.edi: 1
registers.eax: 1319891379
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 31917886
registers.esi: 42207188
registers.ecx: 31923436
exception.instruction_r: cf e9 76 fa ff ff 85 c0 5f 5a 58 e9 cf fb ff ff
exception.instruction: iretd
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x1e7176d
success 0 0
1619861122.664626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635408
registers.edi: 0
registers.eax: 184
registers.ebp: 1635480
registers.edx: 2010606285
registers.ebx: 31922636
registers.esi: 0
registers.ecx: 4294961902
exception.instruction_r: 66 6d e9 1d 06 00 00 8b 3c 04 51 e9 55 ef ff ff
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e7137c
success 0 0
1619861122.664626
__exception__
stacktrace:

                
            
            
            
registers.esp: 1633604
registers.edi: 0
registers.eax: 3847664609
registers.ebp: 31922892
registers.edx: 2010606285
registers.ebx: 0
registers.esi: 0
registers.ecx: 31922636
exception.instruction_r: fa aa 41 29 42 81 d7 85 c4 8e e5 05 65 b8 a5 be
exception.instruction: cli
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e71a57
success 0 0
1619861122.664626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635420
registers.edi: 0
registers.eax: 184
registers.ebp: 1635480
registers.edx: 2010606285
registers.ebx: 0
registers.esi: 31916300
registers.ecx: 4294961902
exception.instruction_r: e6 f2 4a 7d 5f 05 b1 b5 cf 14 5a ee 29 56 a5 8f
exception.instruction: out -0xe, al
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e7004e
success 0 0
1619861122.664626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1633616
registers.edi: 0
registers.eax: 4294967112
registers.ebp: 1633680
registers.edx: 2010606285
registers.ebx: 31916670
registers.esi: 1634296
registers.ecx: 4074
exception.instruction_r: f4 f2 a5 02 5f 98 ab 36 55 dd 46 6c b8 46 2b 12
exception.instruction: hlt
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e701d5
success 0 0
1619861122.664626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637212
registers.edi: 31922905
registers.eax: 1319891379
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 0
registers.esi: 42207188
registers.ecx: 31923436
exception.instruction_r: 6c 07 b1 cd dc c1 74 da 18 35 53 33 3a 9c 36 37
exception.instruction: insb byte ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e70dd3
success 0 0
1619861122.664626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637220
registers.edi: 1
registers.eax: 3325144548
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 31919439
registers.esi: 42207188
registers.ecx: 31923436
exception.instruction_r: 6f e9 39 07 00 00 64 89 25 00 00 00 00 e9 32 fc
exception.instruction: outsd dx, dword ptr [esi]
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e70591
success 0 0
1619861122.664626
__exception__
stacktrace:

                
            
            
            
registers.esp: 1637208
registers.edi: 1
registers.eax: 3325144548
registers.ebp: 31917363
registers.edx: 31937900
registers.ebx: 1637324
registers.esi: 42207188
registers.ecx: 31923436
exception.instruction_r: 66 6d d8 35 f0 1f b5 93 b9 b8 52 d3 98 5f ba 0b
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e704b8
success 0 0
1619861122.664626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637196
registers.edi: 1
registers.eax: 3325144548
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 31920694
registers.esi: 42207188
registers.ecx: 31923440
exception.instruction_r: ec 4b a6 3f a3 1b 82 a4 b7 74 8f 07 f8 6e e7 80
exception.instruction: in al, dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e71226
success 0 0
1619861122.664626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635392
registers.edi: 0
registers.eax: 3640596269
registers.ebp: 1635456
registers.edx: 2010606285
registers.ebx: 0
registers.esi: 31920713
registers.ecx: 31920694
exception.instruction_r: e7 45 08 24 4b 40 e7 c7 1f 15 8d c0 fa fa 8b be
exception.instruction: out 0x45, eax
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e705b3
success 0 0
1619861122.664626
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635376
registers.edi: 1636072
registers.eax: 16
registers.ebp: 31917173
registers.edx: 2010606285
registers.ebx: 0
registers.esi: 0
registers.ecx: 31920694
exception.instruction_r: e6 f3 65 2e 30 b9 f1 34 81 c0 96 2e 83 a8 62 d5
exception.instruction: out -0xd, al
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e70416
success 0 0
1619861122.664626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635392
registers.edi: 1636072
registers.eax: 16
registers.ebp: 1635456
registers.edx: 2010606285
registers.ebx: 31922550
registers.esi: 0
registers.ecx: 31920694
exception.instruction_r: 66 6f 1e ff dd 9d d8 29 9a 77 5d c8 ff 7c 86 29
exception.instruction: outsw dx, word ptr [esi]
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e718c9
success 0 0
1619861122.664626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637220
registers.edi: 1
registers.eax: 3325144548
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 31917886
registers.esi: 42207188
registers.ecx: 31923440
exception.instruction_r: cf e9 76 fa ff ff 85 c0 5f 5a 58 e9 cf fb ff ff
exception.instruction: iretd
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x1e7176d
success 0 0
1619861122.664626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635408
registers.edi: 0
registers.eax: 184
registers.ebp: 1635480
registers.edx: 2010606285
registers.ebx: 31922636
registers.esi: 0
registers.ecx: 4294961902
exception.instruction_r: 66 6d e9 1d 06 00 00 8b 3c 04 51 e9 55 ef ff ff
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e7137c
success 0 0
1619861122.664626
__exception__
stacktrace:

                
            
            
            
registers.esp: 1633604
registers.edi: 0
registers.eax: 3847664609
registers.ebp: 31922892
registers.edx: 2010606285
registers.ebx: 0
registers.esi: 0
registers.ecx: 31922636
exception.instruction_r: fa aa 41 29 42 81 d7 85 c4 8e e5 05 65 b8 a5 be
exception.instruction: cli
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e71a57
success 0 0
1619861122.664626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635420
registers.edi: 0
registers.eax: 184
registers.ebp: 1635480
registers.edx: 2010606285
registers.ebx: 0
registers.esi: 31916300
registers.ecx: 4294961902
exception.instruction_r: e6 f2 4a 7d 5f 05 b1 b5 cf 14 5a ee 29 56 a5 8f
exception.instruction: out -0xe, al
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e7004e
success 0 0
1619861122.664626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1633616
registers.edi: 0
registers.eax: 4294967112
registers.ebp: 1633680
registers.edx: 2010606285
registers.ebx: 31916670
registers.esi: 1634296
registers.ecx: 4074
exception.instruction_r: f4 f2 a5 02 5f 98 ab 36 55 dd 46 6c b8 46 2b 12
exception.instruction: hlt
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e701d5
success 0 0
1619861122.664626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637212
registers.edi: 31922905
registers.eax: 3325144548
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 0
registers.esi: 42207188
registers.ecx: 31923440
exception.instruction_r: 6c 07 b1 cd dc c1 74 da 18 35 53 33 3a 9c 36 37
exception.instruction: insb byte ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e70dd3
success 0 0
1619861122.664626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637220
registers.edi: 1
registers.eax: 3260505215
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 31919439
registers.esi: 42207188
registers.ecx: 31923440
exception.instruction_r: 6f e9 39 07 00 00 64 89 25 00 00 00 00 e9 32 fc
exception.instruction: outsd dx, dword ptr [esi]
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e70591
success 0 0
1619861122.664626
__exception__
stacktrace:

                
            
            
            
registers.esp: 1637208
registers.edi: 1
registers.eax: 3260505215
registers.ebp: 31917363
registers.edx: 31937900
registers.ebx: 1637324
registers.esi: 42207188
registers.ecx: 31923440
exception.instruction_r: 66 6d d8 35 f0 1f b5 93 b9 b8 52 d3 98 5f ba 0b
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e704b8
success 0 0
1619861122.664626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637196
registers.edi: 1
registers.eax: 3260505215
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 31920694
registers.esi: 42207188
registers.ecx: 31923444
exception.instruction_r: ec 4b a6 3f a3 1b 82 a4 b7 74 8f 07 f8 6e e7 80
exception.instruction: in al, dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e71226
success 0 0
1619861122.664626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635392
registers.edi: 0
registers.eax: 3640596269
registers.ebp: 1635456
registers.edx: 2010606285
registers.ebx: 0
registers.esi: 31920713
registers.ecx: 31920694
exception.instruction_r: e7 45 08 24 4b 40 e7 c7 1f 15 8d c0 fa fa 8b be
exception.instruction: out 0x45, eax
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e705b3
success 0 0
1619861122.664626
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635376
registers.edi: 1636072
registers.eax: 16
registers.ebp: 31917173
registers.edx: 2010606285
registers.ebx: 0
registers.esi: 0
registers.ecx: 31920694
exception.instruction_r: e6 f3 65 2e 30 b9 f1 34 81 c0 96 2e 83 a8 62 d5
exception.instruction: out -0xd, al
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e70416
success 0 0
1619861122.664626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635392
registers.edi: 1636072
registers.eax: 16
registers.ebp: 1635456
registers.edx: 2010606285
registers.ebx: 31922550
registers.esi: 0
registers.ecx: 31920694
exception.instruction_r: 66 6f 1e ff dd 9d d8 29 9a 77 5d c8 ff 7c 86 29
exception.instruction: outsw dx, word ptr [esi]
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e718c9
success 0 0
1619861122.664626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637220
registers.edi: 1
registers.eax: 3260505215
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 31917886
registers.esi: 42207188
registers.ecx: 31923444
exception.instruction_r: cf e9 76 fa ff ff 85 c0 5f 5a 58 e9 cf fb ff ff
exception.instruction: iretd
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x1e7176d
success 0 0
1619861122.664626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635408
registers.edi: 0
registers.eax: 184
registers.ebp: 1635480
registers.edx: 2010606285
registers.ebx: 31922636
registers.esi: 0
registers.ecx: 4294961902
exception.instruction_r: 66 6d e9 1d 06 00 00 8b 3c 04 51 e9 55 ef ff ff
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e7137c
success 0 0
1619861122.664626
__exception__
stacktrace:

                
            
            
            
registers.esp: 1633604
registers.edi: 0
registers.eax: 3847664609
registers.ebp: 31922892
registers.edx: 2010606285
registers.ebx: 0
registers.esi: 0
registers.ecx: 31922636
exception.instruction_r: fa aa 41 29 42 81 d7 85 c4 8e e5 05 65 b8 a5 be
exception.instruction: cli
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e71a57
success 0 0
1619861122.664626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635420
registers.edi: 0
registers.eax: 184
registers.ebp: 1635480
registers.edx: 2010606285
registers.ebx: 0
registers.esi: 31916300
registers.ecx: 4294961902
exception.instruction_r: e6 f2 4a 7d 5f 05 b1 b5 cf 14 5a ee 29 56 a5 8f
exception.instruction: out -0xe, al
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e7004e
success 0 0
1619861122.664626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1633616
registers.edi: 0
registers.eax: 4294967112
registers.ebp: 1633680
registers.edx: 2010606285
registers.ebx: 31916670
registers.esi: 1634296
registers.ecx: 4074
exception.instruction_r: f4 f2 a5 02 5f 98 ab 36 55 dd 46 6c b8 46 2b 12
exception.instruction: hlt
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e701d5
success 0 0
1619861122.664626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637212
registers.edi: 31922905
registers.eax: 3260505215
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 0
registers.esi: 42207188
registers.ecx: 31923444
exception.instruction_r: 6c 07 b1 cd dc c1 74 da 18 35 53 33 3a 9c 36 37
exception.instruction: insb byte ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e70dd3
success 0 0
1619861122.680626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637220
registers.edi: 1
registers.eax: 652913320
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 31919439
registers.esi: 42207188
registers.ecx: 31923444
exception.instruction_r: 6f e9 39 07 00 00 64 89 25 00 00 00 00 e9 32 fc
exception.instruction: outsd dx, dword ptr [esi]
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e70591
success 0 0
1619861122.680626
__exception__
stacktrace:

                
            
            
            
registers.esp: 1637208
registers.edi: 1
registers.eax: 652913320
registers.ebp: 31917363
registers.edx: 31937900
registers.ebx: 1637324
registers.esi: 42207188
registers.ecx: 31923444
exception.instruction_r: 66 6d d8 35 f0 1f b5 93 b9 b8 52 d3 98 5f ba 0b
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e704b8
success 0 0
1619861122.680626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637196
registers.edi: 1
registers.eax: 652913320
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 31920694
registers.esi: 42207188
registers.ecx: 31923448
exception.instruction_r: ec 4b a6 3f a3 1b 82 a4 b7 74 8f 07 f8 6e e7 80
exception.instruction: in al, dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e71226
success 0 0
1619861122.680626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635392
registers.edi: 0
registers.eax: 3640596269
registers.ebp: 1635456
registers.edx: 2010606285
registers.ebx: 0
registers.esi: 31920713
registers.ecx: 31920694
exception.instruction_r: e7 45 08 24 4b 40 e7 c7 1f 15 8d c0 fa fa 8b be
exception.instruction: out 0x45, eax
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e705b3
success 0 0
1619861122.680626
__exception__
stacktrace:

                
            
            
            
registers.esp: 1635376
registers.edi: 1636072
registers.eax: 16
registers.ebp: 31917173
registers.edx: 2010606285
registers.ebx: 0
registers.esi: 0
registers.ecx: 31920694
exception.instruction_r: e6 f3 65 2e 30 b9 f1 34 81 c0 96 2e 83 a8 62 d5
exception.instruction: out -0xd, al
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e70416
success 0 0
1619861122.680626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635392
registers.edi: 1636072
registers.eax: 16
registers.ebp: 1635456
registers.edx: 2010606285
registers.ebx: 31922550
registers.esi: 0
registers.ecx: 31920694
exception.instruction_r: 66 6f 1e ff dd 9d d8 29 9a 77 5d c8 ff 7c 86 29
exception.instruction: outsw dx, word ptr [esi]
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e718c9
success 0 0
1619861122.680626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637220
registers.edi: 1
registers.eax: 652913320
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 31917886
registers.esi: 42207188
registers.ecx: 31923448
exception.instruction_r: cf e9 76 fa ff ff 85 c0 5f 5a 58 e9 cf fb ff ff
exception.instruction: iretd
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x1e7176d
success 0 0
1619861122.680626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635408
registers.edi: 0
registers.eax: 184
registers.ebp: 1635480
registers.edx: 2010606285
registers.ebx: 31922636
registers.esi: 0
registers.ecx: 4294961902
exception.instruction_r: 66 6d e9 1d 06 00 00 8b 3c 04 51 e9 55 ef ff ff
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e7137c
success 0 0
1619861122.680626
__exception__
stacktrace:

                
            
            
            
registers.esp: 1633604
registers.edi: 0
registers.eax: 3847664609
registers.ebp: 31922892
registers.edx: 2010606285
registers.ebx: 0
registers.esi: 0
registers.ecx: 31922636
exception.instruction_r: fa aa 41 29 42 81 d7 85 c4 8e e5 05 65 b8 a5 be
exception.instruction: cli
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e71a57
success 0 0
1619861122.680626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1635420
registers.edi: 0
registers.eax: 184
registers.ebp: 1635480
registers.edx: 2010606285
registers.ebx: 0
registers.esi: 31916300
registers.ecx: 4294961902
exception.instruction_r: e6 f2 4a 7d 5f 05 b1 b5 cf 14 5a ee 29 56 a5 8f
exception.instruction: out -0xe, al
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e7004e
success 0 0
1619861122.680626
__exception__
stacktrace:
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
RtlDosSearchPath_Ustr+0xaac RtlCaptureContext-0xa0 ntdll+0x46a8b @ 0x77d76a8b
New_ntdll_RtlDispatchException@8+0xf6 New_ntdll_RtlRemoveVectoredContinueHandler@4-0x23 @ 0x7534482b
KiUserExceptionDispatcher+0xf KiRaiseUserExceptionDispatcher-0x41 ntdll+0x10143 @ 0x77d40143
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1633616
registers.edi: 0
registers.eax: 4294967112
registers.ebp: 1633680
registers.edx: 2010606285
registers.ebx: 31916670
registers.esi: 1634296
registers.ecx: 4074
exception.instruction_r: f4 f2 a5 02 5f 98 ab 36 55 dd 46 6c b8 46 2b 12
exception.instruction: hlt
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e701d5
success 0 0
1619861122.680626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637212
registers.edi: 31922905
registers.eax: 652913320
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 0
registers.esi: 42207188
registers.ecx: 31923448
exception.instruction_r: 6c 07 b1 cd dc c1 74 da 18 35 53 33 3a 9c 36 37
exception.instruction: insb byte ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e70dd3
success 0 0
1619861122.680626
__exception__
stacktrace:
b67a8155bd5e9c453bbc8420fa1fe955+0x6cd22 @ 0x46cd22
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
b67a8155bd5e9c453bbc8420fa1fe955+0x351a6 @ 0x4351a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1637220
registers.edi: 1
registers.eax: 3874134763
registers.ebp: 1637340
registers.edx: 31937900
registers.ebx: 31919439
registers.esi: 42207188
registers.ecx: 31923448
exception.instruction_r: 6f e9 39 07 00 00 64 89 25 00 00 00 00 e9 32 fc
exception.instruction: outsd dx, dword ptr [esi]
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e70591
success 0 0
1619861122.680626
__exception__
stacktrace:

                
            
            
            
registers.esp: 1637208
registers.edi: 1
registers.eax: 3874134763
registers.ebp: 31917363
registers.edx: 31937900
registers.ebx: 1637324
registers.esi: 42207188
registers.ecx: 31923448
exception.instruction_r: 66 6d d8 35 f0 1f b5 93 b9 b8 52 d3 98 5f ba 0b
exception.instruction: insw word ptr es:[edi], dx
exception.exception_code: 0xc0000096
exception.symbol:
exception.address: 0x1e704b8
success 0 0
行为判定
动态指标
One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
Connects to a Dynamic DNS Domain (1 个事件)
domain se7ense7en.hopto.org
Allocates read-write-execute memory (usually to unpack itself) (50 out of 144 个事件)
Time & API Arguments Status Return Repeated
1619861122.274626
NtAllocateVirtualMemory
process_identifier: 2984
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x005d0000
success 0 0
1619861122.274626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77d4f000
success 0 0
1619861122.336626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0060d000
success 0 0
1619861122.336626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x7294a000
success 0 0
1619861122.336626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0060d000
success 0 0
1619861122.336626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0060d000
success 0 0
1619861122.336626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0060d000
success 0 0
1619861122.336626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00437000
success 0 0
1619861122.352626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0063c000
success 0 0
1619861122.352626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0063c000
success 0 0
1619861122.352626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0063c000
success 0 0
1619861122.352626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00437000
success 0 0
1619861122.539626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067c000
success 0 0
1619861122.539626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067c000
success 0 0
1619861122.539626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067c000
success 0 0
1619861122.539626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00437000
success 0 0
1619861122.539626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067d000
success 0 0
1619861122.539626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067d000
success 0 0
1619861122.539626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067d000
success 0 0
1619861122.539626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00437000
success 0 0
1619861122.539626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067d000
success 0 0
1619861122.539626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067d000
success 0 0
1619861122.555626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067d000
success 0 0
1619861122.555626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00437000
success 0 0
1619861122.555626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067f000
success 0 0
1619861122.555626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067f000
success 0 0
1619861122.555626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067f000
success 0 0
1619861122.555626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00437000
success 0 0
1619861122.649626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067f000
success 0 0
1619861122.649626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067f000
success 0 0
1619861122.649626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067f000
success 0 0
1619861122.649626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00437000
success 0 0
1619861122.649626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067d000
success 0 0
1619861122.649626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067d000
success 0 0
1619861122.649626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067d000
success 0 0
1619861122.649626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00437000
success 0 0
1619861122.649626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067c000
success 0 0
1619861122.649626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067c000
success 0 0
1619861122.649626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0067c000
success 0 0
1619861122.649626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00437000
success 0 0
1619861122.649626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0063c000
success 0 0
1619861122.649626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0063c000
success 0 0
1619861122.649626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0063c000
success 0 0
1619861122.649626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00437000
success 0 0
1619861122.664626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0063c000
success 0 0
1619861122.664626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0063c000
success 0 0
1619861122.664626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x0063c000
success 0 0
1619861122.664626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00437000
success 0 0
1619861122.664626
NtAllocateVirtualMemory
process_identifier: 2984
region_size: 24576
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x01e70000
success 0 0
1619893652.850374
NtAllocateVirtualMemory
process_identifier: 2236
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x003e0000
success 0 0
Checks whether any human activity is being performed by constantly checking whether the foreground window changed
Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) (1 个事件)
Time & API Arguments Status Return Repeated
1619861122.102626
NtProtectVirtualMemory
process_identifier: 2984
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 24576
protection: 32 (PAGE_EXECUTE_READ)
process_handle: 0xffffffff
base_address: 0x00560000
success 0 0
The binary likely contains encrypted or compressed data indicative of a packer (3 个事件)
entropy 7.992731713961119 section {'size_of_data': '0x00033000', 'virtual_address': '0x00001000', 'entropy': 7.992731713961119, 'name': '.data', 'virtual_size': '0x00032e5b'} description A section with a high entropy has been found
entropy 7.681082805063362 section {'size_of_data': '0x000ca000', 'virtual_address': '0x0007a000', 'entropy': 7.681082805063362, 'name': '.rsrc', 'virtual_size': '0x000c967b'} description A section with a high entropy has been found
entropy 0.7832817337461301 description Overall entropy of this PE file is high
Checks for the Locally Unique Identifier on the system for a suspicious privilege (1 个事件)
Time & API Arguments Status Return Repeated
1619893656.381374
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
Terminates another process (2 个事件)
Time & API Arguments Status Return Repeated
1619861147.399626
NtTerminateProcess
status_code: 0x00000000
process_identifier: 376
process_handle: 0x00000148
failed 0 0
1619861147.399626
NtTerminateProcess
status_code: 0x00000000
process_identifier: 376
process_handle: 0x00000148
success 0 0
网络通信
One or more of the buffers contains an embedded PE file (3 个事件)
buffer Buffer with sha1: bf4b6c350d2337694a414c8acdd1dea93f13e294
buffer Buffer with sha1: 874b7c3c97cc5b13b9dd172fec5a54bc1f258005
buffer Buffer with sha1: 874f3caf663265f7dd18fb565d91b7d915031251
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Looks for the Windows Idle Time to determine the uptime (1 个事件)
Time & API Arguments Status Return Repeated
1619893656.866374
NtQuerySystemInformation
information_class: 8 (SystemProcessorPerformanceInformation)
success 0 0
A process attempted to delay the analysis task. (1 个事件)
description RegAsm.exe tried to sleep 5456476 seconds, actually delayed analysis time by 5456476 seconds
Installs itself for autorun at Windows startup (1 个事件)
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DSL Service reg_value C:\Program Files (x86)\DSL Service\dslsvc.exe
Manipulates memory of a non-child process indicative of process injection (3 个事件)
Process injection Process 2984 manipulating memory of non-child process 376
Time & API Arguments Status Return Repeated
1619861147.164626
NtUnmapViewOfSection
process_identifier: 376
region_size: 53248
process_handle: 0x00000148
base_address: 0x00400000
failed 3221225497 0
1619861147.164626
NtMapViewOfSection
section_handle: 0x000000d4
process_identifier: 376
commit_size: 0
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000148
allocation_type: 0 ()
section_offset: 0
view_size: 242282
base_address: 0x00400000
failed 3221225496 0
Used NtSetContextThread to modify a thread in a remote process indicative of process injection (2 个事件)
Process injection Process 2984 called NtSetContextThread to modify thread in remote process 2236
Time & API Arguments Status Return Repeated
1619861147.539626
NtSetContextThread
thread_handle: 0x00000150
registers.eip: 4423680
registers.esp: 2947732
registers.edi: 0
registers.eax: 4319122
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 2010382788
process_identifier: 2236
success 0 0
Resumed a suspended thread in a remote process potentially indicative of process injection (2 个事件)
Process injection Process 2984 resumed a thread in remote process 2236
Time & API Arguments Status Return Repeated
1619861147.758626
NtResumeThread
thread_handle: 0x00000150
suspend_count: 1
process_identifier: 2236
success 0 0
Executed a process and injected code into it, probably while unpacking (16 个事件)
Time & API Arguments Status Return Repeated
1619861147.164626
CreateProcessInternalW
thread_identifier: 784
thread_handle: 0x00000144
process_identifier: 376
current_directory:
filepath: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
track: 1
command_line:
filepath_r: C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000148
inherit_handles: 0
success 1 0
1619861147.164626
NtGetContextThread
thread_handle: 0x00000144
success 0 0
1619861147.164626
NtUnmapViewOfSection
process_identifier: 376
region_size: 53248
process_handle: 0x00000148
base_address: 0x00400000
failed 3221225497 0
1619861147.164626
NtMapViewOfSection
section_handle: 0x000000d4
process_identifier: 376
commit_size: 0
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000148
allocation_type: 0 ()
section_offset: 0
view_size: 242282
base_address: 0x00400000
failed 3221225496 0
1619861147.524626
CreateProcessInternalW
thread_identifier: 2632
thread_handle: 0x00000150
process_identifier: 2236
current_directory:
filepath: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
track: 1
command_line:
filepath_r: C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x0000014c
inherit_handles: 0
success 1 0
1619861147.524626
NtGetContextThread
thread_handle: 0x00000150
success 0 0
1619861147.524626
NtUnmapViewOfSection
process_identifier: 2236
region_size: 2004156416
process_handle: 0x0000014c
base_address: 0x00400000
failed 3221225497 0
1619861147.524626
NtMapViewOfSection
section_handle: 0x000000d4
process_identifier: 2236
commit_size: 0
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x0000014c
allocation_type: 0 ()
section_offset: 0
view_size: 245760
base_address: 0x00400000
success 0 0
1619861147.539626
NtSetContextThread
thread_handle: 0x00000150
registers.eip: 4423680
registers.esp: 2947732
registers.edi: 0
registers.eax: 4319122
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 2010382788
process_identifier: 2236
success 0 0
1619861147.758626
NtResumeThread
thread_handle: 0x00000150
suspend_count: 1
process_identifier: 2236
success 0 0
1619893653.475374
NtResumeThread
thread_handle: 0x00000168
suspend_count: 1
process_identifier: 2236
success 0 0
1619893653.538374
NtResumeThread
thread_handle: 0x000001c0
suspend_count: 1
process_identifier: 2236
success 0 0
1619893656.194374
NtResumeThread
thread_handle: 0x00000280
suspend_count: 1
process_identifier: 2236
success 0 0
1619893656.272374
NtResumeThread
thread_handle: 0x000002b0
suspend_count: 1
process_identifier: 2236
success 0 0
1619893656.366374
NtResumeThread
thread_handle: 0x000002d4
suspend_count: 1
process_identifier: 2236
success 0 0
1619893657.866374
NtResumeThread
thread_handle: 0x00000384
suspend_count: 1
process_identifier: 2236
success 0 0
File has been identified by 59 AntiVirus engines on VirusTotal as malicious (50 out of 59 个事件)
Bkav W32.AIDetectVM.malware1
FireEye Generic.mg.b67a8155bd5e9c45
CAT-QuickHeal Backdoor.MSIL
McAfee GenericRXLK-QT!B67A8155BD5E
Cylance Unsafe
Zillya Trojan.NanoBot.Win32.2871
Sangfor Malware
K7AntiVirus NetWorm ( 700000151 )
Alibaba Trojan:Win32/vbcrypt.ali2000008
K7GW NetWorm ( 700000151 )
Cybereason malicious.b8ee0e
Arcabit Trojan.Generic.D297C989
Invincea heuristic
Symantec ML.Attribute.HighConfidence
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 100)
Kaspersky Backdoor.MSIL.NanoBot.bdyn
BitDefender Trojan.GenericKD.43501961
NANO-Antivirus Trojan.Win32.NanoBot.hnwwsy
ViRobot Trojan.Win32.S.Agent.1327104.BP
MicroWorld-eScan Trojan.GenericKD.43501961
Avast Win32:RATX-gen [Trj]
Tencent Win32.Trojan.Inject.Auto
Ad-Aware Trojan.GenericKD.43501961
Emsisoft Trojan.GenericKD.43501961 (B)
Comodo Backdoor@#2vyce7hujqxp1
F-Secure Trojan.TR/Crypt.XPACK.Gen3
DrWeb Trojan.Nanocore.23
VIPRE Trojan.Win32.Generic!BT
TrendMicro Trojan.Win32.NANOCORE.THGAGBO
Sophos Mal/Generic-S
SentinelOne DFI - Malicious PE
Cyren W32/Trojan.ZKXK-2549
Webroot W32.Trojan.TR.Crypt.XPACK.Gen3
Avira TR/Crypt.XPACK.Gen3
Antiy-AVL Trojan[Backdoor]/MSIL.NanoBot
Microsoft Backdoor:MSIL/Noancooe.B
Endgame malicious (high confidence)
AegisLab Trojan.MSIL.NanoBot.m!c
ZoneAlarm Backdoor.MSIL.NanoBot.bdyn
GData Trojan.GenericKD.43501961
TACHYON Backdoor/W32.VB-NanoBot.1327104
AhnLab-V3 Malware/Win32.Generic.C4163065
Acronis suspicious
ALYac Trojan.GenericKD.43501961
MAX malware (ai score=85)
VBA32 TScope.Trojan.VB
Malwarebytes Backdoor.NanoCore
ESET-NOD32 MSIL/NanoCore.E
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2018-11-15 08:00:00

Imports

Library OLE32.DLL:
0x434000 CoTaskMemAlloc
Library KERNEL32.DLL:
0x434008 GetProcAddress
Library MSVBVM60.DLL:
0x434010 __vbaVarTstGt
0x434014 __vbaVarSub
0x434018 _CIcos
0x43401c _adj_fptan
0x434020 __vbaVarMove
0x434024 __vbaStrI4
0x434028 __vbaVarVargNofree
0x43402c __vbaFreeVar
0x434030 __vbaAryMove
0x434034 __vbaStrVarMove
0x434038 __vbaLenBstr
0x43403c __vbaFreeVarList
0x434040 _adj_fdiv_m64
0x434044
0x434048 __vbaFreeObjList
0x43404c __vbaStrErrVarCopy
0x434050 _adj_fprem1
0x434054 __vbaStrCat
0x434058 __vbaRecDestruct
0x43405c __vbaSetSystemError
0x434064 _adj_fdiv_m32
0x434068 __vbaAryDestruct
0x43406c __vbaVarForInit
0x434070 __vbaObjSet
0x434074
0x434078 _adj_fdiv_m16i
0x43407c __vbaObjSetAddref
0x434080 _adj_fdivr_m16i
0x434084 __vbaRefVarAry
0x434088 __vbaBoolVarNull
0x43408c _CIsin
0x434090 __vbaErase
0x434094
0x434098 __vbaChkstk
0x43409c EVENT_SINK_AddRef
0x4340a0
0x4340a4 __vbaAryConstruct2
0x4340a8 __vbaVarTstEq
0x4340ac __vbaVarLikeVar
0x4340b0 DllFunctionCall
0x4340b4 __vbaRedimPreserve
0x4340b8 _adj_fpatan
0x4340bc __vbaRedim
0x4340c0 EVENT_SINK_Release
0x4340c4 __vbaNew
0x4340c8 _CIsqrt
0x4340d0 __vbaStr2Vec
0x4340d4 __vbaExceptHandler
0x4340d8 __vbaStrToUnicode
0x4340dc _adj_fprem
0x4340e0 _adj_fdivr_m64
0x4340e4
0x4340e8
0x4340ec __vbaFPException
0x4340f0 GetMem4
0x4340f4 __vbaStrVarVal
0x4340f8 __vbaUbound
0x4340fc __vbaVarCat
0x434100
0x434104 _CIlog
0x434108 __vbaNew2
0x43410c __vbaVar2Vec
0x434110 __vbaR8Str
0x434114 _adj_fdiv_m32i
0x434118 _adj_fdivr_m32i
0x43411c __vbaStrCopy
0x434120 __vbaFreeStrList
0x434124 _adj_fdivr_m32
0x434128 _adj_fdiv_r
0x43412c
0x434130 __vbaVarTstNe
0x434134 __vbaI4Var
0x434138 __vbaAryLock
0x43413c __vbaVarAdd
0x434140 __vbaStrToAnsi
0x434144 __vbaVarDup
0x434148 __vbaFpI4
0x43414c
0x434150 __vbaVarCopy
0x434154 _CIatan
0x434158 __vbaStrMove
0x43415c __vbaCastObj
0x434160 _allmul
0x434164 _CItan
0x434168
0x43416c __vbaAryUnlock
0x434170
0x434174 __vbaVarForNext
0x434178 _CIexp
0x43417c __vbaFreeStr
0x434180 __vbaFreeObj

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51378 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 53210 114.114.114.114 53
192.168.56.101 53380 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58368 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.