Summary | ZeroBOX

file5.bin

PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 July 15, 2021, 10:04 a.m. July 15, 2021, 10:12 a.m.
Size 164.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 f035afb3bbb9ddbab86705fc35ee3277
SHA256 f1da83287dc71efd8d39d03f2c349830826b9c8698b0a7bb6cc6e7eb959428da
CRC32 F44838D0
ssdeep 3072:27p3dQo86PI7e2seiAPWN6Ox1uTQjY48+STfLbh9w47sI5:s3dyj7NsenjOx1KQU5TTbbT
PDB Path Gpernfedeefe.pdb
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path Gpernfedeefe.pdb
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: file5+0x21e8
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 0
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: file5+0x21e9
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 0
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: file5+0x21eb
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 1
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: file5+0x21ec
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 1
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: file5+0x21e8
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 1
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: file5+0x21e9
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 1
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: file5+0x21eb
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 2
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: file5+0x21ec
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 2
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: file5+0x21e8
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 2
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: file5+0x21e9
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 2
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: file5+0x21eb
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 3
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: file5+0x21ec
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 3
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: file5+0x21e8
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 3
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: file5+0x21e9
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 3
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: file5+0x21eb
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 4
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: file5+0x21ec
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 4
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: file5+0x21e8
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 4
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: file5+0x21e9
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 4
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: file5+0x21eb
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 5
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: file5+0x21ec
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 5
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: file5+0x21e8
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 5
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: file5+0x21e9
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 5
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: file5+0x21eb
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 6
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: file5+0x21ec
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 6
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: file5+0x21e8
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 6
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: file5+0x21e9
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 6
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: file5+0x21eb
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 7
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: file5+0x21ec
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 7
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: file5+0x21e8
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 7
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: file5+0x21e9
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 7
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: file5+0x21eb
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 8
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: file5+0x21ec
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 8
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: file5+0x21e8
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 8
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: file5+0x21e9
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 8
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: file5+0x21eb
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 9
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: file5+0x21ec
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 9
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: file5+0x21e8
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 9
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: file5+0x21e9
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 9
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: file5+0x21eb
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 10
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: file5+0x21ec
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 10
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: file5+0x21e8
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 10
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: file5+0x21e9
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 10
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: file5+0x21eb
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 11
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: file5+0x21ec
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 11
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: file5+0x21e8
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 11
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: file5+0x21e9
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 11
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: file5+0x21eb
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 12
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: file5+0x21ec
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 12
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: file5+0x21e8
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 12
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: file5+0x21e9
exception.instruction: int3
exception.module: file5.bin
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 12
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 24576
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x021b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00014000', u'virtual_address': u'0x00001000', u'entropy': 7.867065442724716, u'name': u'.text', u'virtual_size': u'0x00013a7c'} entropy 7.86706544272 description A section with a high entropy has been found
section {u'size_of_data': u'0x00011000', u'virtual_address': u'0x00016000', u'entropy': 7.842370817605384, u'name': u'.data', u'virtual_size': u'0x00011e46'} entropy 7.84237081761 description A section with a high entropy has been found
entropy 0.925 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

__anomaly__

tid: 1868
message: Encountered 65537 exceptions, quitting.
subcategory: exception
function_name:
1 0 0
Bkav W32.AIDetect.malware1
Lionic Trojan.Win32.Convagent.4!c
Elastic malicious (high confidence)
McAfee Artemis!F035AFB3BBB9
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 00549d461 )
Alibaba Trojan:Win32/EmotetedCryptc.180910
K7GW Trojan ( 00549d461 )
Cybereason malicious.89b2ad
Symantec Packed.Generic.553
APEX Malicious
Paloalto generic.ml
Kaspersky UDS:DangerousObject.Multi.Generic
Avast Win32:TrojanX-gen [Trj]
Sophos Mal/Generic-R + Mal/EncPk-APX
McAfee-GW-Edition BehavesLike.Win32.Generic.cc
FireEye Generic.mg.f035afb3bbb9ddba
SentinelOne Static AI - Malicious PE
Webroot W32.Trojan.Gen
Kingsoft Win32.Troj.Generic_a.a.(kcloud)
Microsoft Trojan:Win32/Emotet.LK!ml
GData Win32.Trojan-Downloader.Dridex.26GV50
Cynet Malicious (score: 100)
Acronis suspicious
BitDefenderTheta Gen:NN.ZexaF.34796.ku0@aaN3!Oi
Malwarebytes MachineLearning/Anomalous.100%
TrendMicro-HouseCall TROJ_GEN.R002H07GE21
Rising Trojan.Generic@ML.96 (RDML:3oqkZRjcpLs9CUdoVTed5A)
Fortinet W32/PossibleThreat
AVG Win32:TrojanX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (W)
Qihoo-360 Win32/Trojan.Generic.HxQBlecA