Summary | ZeroBOX

bdxloc.jpg

Gen1 Malicious Library PE32 DLL PE File
Category Machine Started Completed
FILE s1_win7_x6402 Oct. 14, 2021, 7:52 a.m. Oct. 14, 2021, 7:55 a.m.
Size 608.0KB
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 07c2dc7047771b92bca28914cdfb4dad
SHA256 0a29f3bbb012d4e71f0e9b147fc6bbf49a29809f1929861358f1a12804ea5556
CRC32 B800B3CD
ssdeep 12288:nZGQdqOGRFJqydLqQSeCqsVK8kPRGO35N9mV5zXc6:nZ0/WjeCVVK8kP9N9o1
PDB Path c:\Cause\417\Organ\Out vi\grand.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Win32_Trojan_Gen_2_0904B0_Zero - Win32 Trojan Gen
  • IsDLL - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path c:\Cause\417\Organ\Out vi\grand.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962304
registers.edi: 2959208
registers.eax: 2008080422
registers.ebp: 2008154697
registers.edx: 129161
registers.ebx: 2704346981
registers.esi: 1990393856
registers.ecx: 66040
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962280
registers.edi: 16
registers.eax: 2008080422
registers.ebp: 35194832
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962280
registers.edi: 15
registers.eax: 2008080422
registers.ebp: 35194848
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962280
registers.edi: 14
registers.eax: 2008080422
registers.ebp: 35194864
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962280
registers.edi: 13
registers.eax: 2008080422
registers.ebp: 35194880
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962280
registers.edi: 12
registers.eax: 2008080422
registers.ebp: 35194896
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962280
registers.edi: 11
registers.eax: 2008080422
registers.ebp: 35194912
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962280
registers.edi: 10
registers.eax: 2008080422
registers.ebp: 35194928
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962280
registers.edi: 9
registers.eax: 2008080422
registers.ebp: 35194944
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962280
registers.edi: 8
registers.eax: 2008080422
registers.ebp: 35194960
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962280
registers.edi: 7
registers.eax: 2008080422
registers.ebp: 35194976
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962280
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 35194992
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962280
registers.edi: 5
registers.eax: 2008080422
registers.ebp: 35195008
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962280
registers.edi: 4
registers.eax: 2008080422
registers.ebp: 35195024
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962280
registers.edi: 3
registers.eax: 2008080422
registers.ebp: 35195040
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962280
registers.edi: 2
registers.eax: 2008080422
registers.ebp: 35195056
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962280
registers.edi: 1
registers.eax: 2008080422
registers.ebp: 35195072
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:
DllRegisterServer+0xcbc7 bdxloc+0x16937 @ 0x9f6937

exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1961480
registers.edi: 12
registers.eax: 2008080422
registers.ebp: 1962548
registers.edx: 23
registers.ebx: 1962564
registers.esi: 23
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962532
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 96784
registers.edx: 827898
registers.ebx: 0
registers.esi: 282
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962508
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 16
registers.edx: 0
registers.ebx: 64
registers.esi: 35198312
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962508
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 15
registers.edx: 0
registers.ebx: 64
registers.esi: 35198336
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962508
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 14
registers.edx: 0
registers.ebx: 64
registers.esi: 35198360
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962508
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 13
registers.edx: 0
registers.ebx: 64
registers.esi: 35198384
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962508
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 12
registers.edx: 0
registers.ebx: 64
registers.esi: 35198408
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962508
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 11
registers.edx: 0
registers.ebx: 64
registers.esi: 35198432
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962508
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 10
registers.edx: 0
registers.ebx: 64
registers.esi: 35198456
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962508
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 9
registers.edx: 0
registers.ebx: 64
registers.esi: 35198480
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962508
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 8
registers.edx: 0
registers.ebx: 64
registers.esi: 35198504
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962508
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 7
registers.edx: 0
registers.ebx: 64
registers.esi: 35198528
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962508
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 6
registers.edx: 0
registers.ebx: 64
registers.esi: 35198552
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962508
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 5
registers.edx: 0
registers.ebx: 64
registers.esi: 35198576
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962508
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 4
registers.edx: 0
registers.ebx: 64
registers.esi: 35198600
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962508
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 3
registers.edx: 0
registers.ebx: 64
registers.esi: 35198624
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962508
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 2
registers.edx: 0
registers.ebx: 64
registers.esi: 35198648
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x9f105c
registers.esp: 1962508
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 1
registers.edx: 0
registers.ebx: 64
registers.esi: 35198672
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x92105c
registers.esp: 2813732
registers.edi: 5384032
registers.eax: 2008080422
registers.ebp: 2008154697
registers.edx: 129161
registers.ebx: 2704346981
registers.esi: 1990393856
registers.ecx: 66040
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x92105c
registers.esp: 2813708
registers.edi: 16
registers.eax: 2008080422
registers.ebp: 34932688
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x92105c
registers.esp: 2813708
registers.edi: 15
registers.eax: 2008080422
registers.ebp: 34932704
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x92105c
registers.esp: 2813708
registers.edi: 14
registers.eax: 2008080422
registers.ebp: 34932720
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x92105c
registers.esp: 2813708
registers.edi: 13
registers.eax: 2008080422
registers.ebp: 34932736
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x92105c
registers.esp: 2813708
registers.edi: 12
registers.eax: 2008080422
registers.ebp: 34932752
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x92105c
registers.esp: 2813708
registers.edi: 11
registers.eax: 2008080422
registers.ebp: 34932768
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x92105c
registers.esp: 2813708
registers.edi: 10
registers.eax: 2008080422
registers.ebp: 34932784
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x92105c
registers.esp: 2813708
registers.edi: 9
registers.eax: 2008080422
registers.ebp: 34932800
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x92105c
registers.esp: 2813708
registers.edi: 8
registers.eax: 2008080422
registers.ebp: 34932816
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x92105c
registers.esp: 2813708
registers.edi: 7
registers.eax: 2008080422
registers.ebp: 34932832
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x92105c
registers.esp: 2813708
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 34932848
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x92105c
registers.esp: 2813708
registers.edi: 5
registers.eax: 2008080422
registers.ebp: 34932864
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x92105c
registers.esp: 2813708
registers.edi: 4
registers.eax: 2008080422
registers.ebp: 34932880
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec bdxloc+0x1105c
exception.address: 0x92105c
registers.esp: 2813708
registers.edi: 3
registers.eax: 2008080422
registers.ebp: 34932896
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2072
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a0d000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2072
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73fe1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2072
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 24576
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a74000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2072
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007a0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2072
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007b0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2072
region_size: 614400
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00870000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1628
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0093d000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1628
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73fe1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1628
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 24576
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x009a4000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1628
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00350000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1628
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00360000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1628
region_size: 614400
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00410000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1628
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73e51000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1628
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73e53000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1312
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01ded000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1312
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73fe1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1312
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 24576
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01e54000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1312
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007e0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1312
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007f0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1312
region_size: 614400
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x008c0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0
Elastic malicious (high confidence)
Cylance Unsafe
APEX Malicious
Sophos ML/PE-A
Microsoft Trojan:Win32/Sabsik.FL.B!ml
SentinelOne Static AI - Suspicious PE