Summary | ZeroBOX

Receipt-427172.xls

VBA_macro PE32 MSOffice File PE File
Category Machine Started Completed
FILE s1_win7_x6402 July 15, 2021, 10:20 a.m. July 15, 2021, 10:31 a.m.
Size 710.5KB
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Invoice 427172 from Quickbooks, LLC, Author: Quickbooks, LLC, Last Saved By: user, Name of Creating Application: Microsoft Excel, Create Time/Date: Wed Jul 14 08:38:23 2021, Last Saved Time/Date: Wed Jul 14 14:15:06 2021, Security: 0
MD5 cf1af8277a86596fc04df4adbddb0702
SHA256 cdcc50360daab3bda1f658df5d13f1c205c64cc628a06d4e887fecd84d7c7fcd
CRC32 CF14C82A
ssdeep 12288:mRYbXrlUc6XS/CwRl+4MW1H5onZHBDznxcp/c0UGtkbByxlFYd2DrpjnqO:RUc6EjDMW1UrDjxcNcfgZI2oO
Yara
  • Contains_VBA_macro_code - Detect a MS Office document with embedded VBA macro code [binaries]
  • Microsoft_Office_File_Zero - Microsoft Office File

IP Address Status Action
128.199.243.169 Active Moloch
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: quppercaserowletter+0x21e8
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 0
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: quppercaserowletter+0x21e9
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 0
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: quppercaserowletter+0x21eb
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 1
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: quppercaserowletter+0x21ec
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 1
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: quppercaserowletter+0x21e8
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 1
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: quppercaserowletter+0x21e9
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 1
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: quppercaserowletter+0x21eb
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 2
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: quppercaserowletter+0x21ec
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 2
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: quppercaserowletter+0x21e8
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 2
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: quppercaserowletter+0x21e9
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 2
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: quppercaserowletter+0x21eb
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 3
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: quppercaserowletter+0x21ec
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 3
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: quppercaserowletter+0x21e8
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 3
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: quppercaserowletter+0x21e9
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 3
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: quppercaserowletter+0x21eb
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 4
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: quppercaserowletter+0x21ec
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 4
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: quppercaserowletter+0x21e8
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 4
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: quppercaserowletter+0x21e9
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 4
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: quppercaserowletter+0x21eb
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 5
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: quppercaserowletter+0x21ec
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 5
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: quppercaserowletter+0x21e8
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 5
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: quppercaserowletter+0x21e9
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 5
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: quppercaserowletter+0x21eb
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 6
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: quppercaserowletter+0x21ec
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 6
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: quppercaserowletter+0x21e8
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 6
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: quppercaserowletter+0x21e9
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 6
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: quppercaserowletter+0x21eb
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 7
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: quppercaserowletter+0x21ec
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 7
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: quppercaserowletter+0x21e8
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 7
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: quppercaserowletter+0x21e9
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 7
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: quppercaserowletter+0x21eb
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 8
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: quppercaserowletter+0x21ec
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 8
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: quppercaserowletter+0x21e8
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 8
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: quppercaserowletter+0x21e9
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 8
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: quppercaserowletter+0x21eb
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 9
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: quppercaserowletter+0x21ec
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 9
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: quppercaserowletter+0x21e8
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 9
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: quppercaserowletter+0x21e9
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 9
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: quppercaserowletter+0x21eb
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 10
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: quppercaserowletter+0x21ec
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 10
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: quppercaserowletter+0x21e8
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 10
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: quppercaserowletter+0x21e9
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 10
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: quppercaserowletter+0x21eb
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 11
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: quppercaserowletter+0x21ec
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 11
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: quppercaserowletter+0x21e8
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 11
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: quppercaserowletter+0x21e9
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 11
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00
exception.symbol: quppercaserowletter+0x21eb
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8683
exception.address: 0x100021eb
registers.esp: 1638276
registers.edi: 0
registers.eax: 12
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc eb f2 58 64 a3 00 00 00 00 58 e9 b0 4a 00 00
exception.symbol: quppercaserowletter+0x21ec
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8684
exception.address: 0x100021ec
registers.esp: 1638276
registers.edi: 0
registers.eax: 12
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9
exception.symbol: quppercaserowletter+0x21e8
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8680
exception.address: 0x100021e8
registers.esp: 1638276
registers.edi: 0
registers.eax: 12
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77799ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77799ea5

exception.instruction_r: cc 40 cc cc eb f2 58 64 a3 00 00 00 00 58 e9 b0
exception.symbol: quppercaserowletter+0x21e9
exception.instruction: int3
exception.module: qUpperCaseRowLetter.exe
exception.exception_code: 0x80000003
exception.offset: 8681
exception.address: 0x100021e9
registers.esp: 1638276
registers.edi: 0
registers.eax: 12
registers.ebp: 1638292
registers.edx: 1637888
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 1638088
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2388
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6bc17000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2388
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6b8b3000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2388
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05ad6000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2388
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05ad6000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73c02000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6b8b3000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2696
region_size: 24576
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01d60000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\ProgramData\qUpperCaseRowLetter.exe
cmdline mshta "C:\ProgramData\qWBATExcel4MacroSheet.sct"
Elastic malicious (high confidence)
MicroWorld-eScan VBA.Heur2.Dridex.2.1C723EC4.Gen
FireEye VBA.Heur2.Dridex.2.1C723EC4.Gen
ALYac VBA.Heur2.Dridex.2.1C723EC4.Gen
Avast SNH:Script [Dropper]
ClamAV Doc.Dropper.MSHTA-6966166-0
Kaspersky HEUR:Trojan-Downloader.Script.Generic
BitDefender VBA.Heur2.Dridex.2.1C723EC4.Gen
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi
Ad-Aware VBA.Heur2.Dridex.2.1C723EC4.Gen
TACHYON Suspicious/X97M.Dropper.Gen
McAfee-GW-Edition BehavesLike.OLE2.Downloader.bb
Emsisoft VBA.Heur2.Dridex.2.1C723EC4.Gen (B)
SentinelOne Static AI - Suspicious OLE
ZoneAlarm HEUR:Trojan-Downloader.Script.Generic
GData VBA.Heur2.Dridex.2.1C723EC4.Gen
MAX malware (ai score=86)
AVG SNH:Script [Dropper]
parent_process excel.exe martian_process mshta "C:\ProgramData\qWBATExcel4MacroSheet.sct"
Time & API Arguments Status Return Repeated

__anomaly__

tid: 2700
message: Encountered 65537 exceptions, quitting.
subcategory: exception
function_name:
1 0 0