Summary | ZeroBOX

proxy-NSFS-setup.exe

Malicious Packer OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 June 24, 2021, 7:30 p.m. June 24, 2021, 7:59 p.m.
Size 4.5MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 700fedb3a0a3fa5e6d74dbb16b909d47
SHA256 0d08230ed56d3391dc2eaae90e49e5c4ad3be5adffc25dbb177b840b9c035cb8
CRC32 8B43511C
ssdeep 98304:QaGu+wGRJP6w6N1mB0H6pSNsrnnbODj1htz+69LuQa6al:QakRR16wqQ0/NsTnIfMwLA
PDB Path C:\ripoy\tamiyogukepu\zikujeyikemed_84 yidusac\r.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch
77.111.240.34 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\ripoy\tamiyogukepu\zikujeyikemed_84 yidusac\r.pdb
resource name AFX_DIALOG_LAYOUT
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 49592744
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0

__exception__

stacktrace:
LocalFlags+0x50 LocalHandle-0xee kernel32+0x831df @ 0x757a31df
_CallPattern@8+0x488 proxy-nsfs-setup+0x457938 @ 0x857938
_CallPattern@8+0x13fa proxy-nsfs-setup+0x4588aa @ 0x8588aa
_CallPattern@8-0x455f0a proxy-nsfs-setup+0x15a6 @ 0x4015a6
_CallPattern@8-0x456081 proxy-nsfs-setup+0x142f @ 0x40142f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 27 56 02 00 f6 40 07 3f 0f 84
exception.symbol: RtlGetUserInfoHeap+0x4e RtlQueueWorkItem-0x3e7 ntdll+0x67cbf
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 425151
exception.address: 0x77407cbf
registers.esp: 1626888
registers.edi: 14352384
registers.eax: 4294967288
registers.ebp: 1626940
registers.edx: 998
registers.ebx: 0
registers.esi: 0
registers.ecx: 1908
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4440064
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b10000
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00460000', u'virtual_address': u'0x00001000', u'entropy': 7.995703378295189, u'name': u'.text', u'virtual_size': u'0x0045ff70'} entropy 7.9957033783 description A section with a high entropy has been found
entropy 0.966976041442 description Overall entropy of this PE file is high
host 77.111.240.34
Time & API Arguments Status Return Repeated

__anomaly__

tid: 1908
message: Encountered 65537 exceptions, quitting.
subcategory: exception
function_name:
1 0 0