Summary | ZeroBOX

yrbmplg.jpg

Gen1 Malicious Library PE32 DLL PE File
Category Machine Started Completed
FILE s1_win7_x6402 Oct. 14, 2021, 3:32 p.m. Oct. 14, 2021, 3:40 p.m.
Size 608.0KB
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 030ebed21ce55e6477e91bf28bde182d
SHA256 a34987511b26e4ba166200b8e40f73952713debc5bd9e20016a5325e45de7a93
CRC32 F86E5DC0
ssdeep 12288:yZGQdqOG0kJqydLqQSeCqsVK8kPRGO35N9mVozXc6:yZ0hWjeCVVK8kP9N9o0
PDB Path c:\Cause\417\Organ\Out vi\grand.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Win32_Trojan_Gen_2_0904B0_Zero - Win32 Trojan Gen
  • IsDLL - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
179.189.229.254 Active Moloch
164.124.101.2 Active Moloch
45.36.99.184 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49172 -> 45.36.99.184:443 2404318 ET CNC Feodo Tracker Reported CnC Server group 19 A Network Trojan was detected

Suricata TLS

No Suricata TLS

pdb_path c:\Cause\417\Organ\Out vi\grand.pdb
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961544
registers.edi: 3417968
registers.eax: 2008080422
registers.ebp: 2008154697
registers.edx: 129161
registers.ebx: 2704346981
registers.esi: 1990393856
registers.ecx: 66040
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961520
registers.edi: 16
registers.eax: 2008080422
registers.ebp: 35588048
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961520
registers.edi: 15
registers.eax: 2008080422
registers.ebp: 35588064
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961520
registers.edi: 14
registers.eax: 2008080422
registers.ebp: 35588080
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961520
registers.edi: 13
registers.eax: 2008080422
registers.ebp: 35588096
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961520
registers.edi: 12
registers.eax: 2008080422
registers.ebp: 35588112
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961520
registers.edi: 11
registers.eax: 2008080422
registers.ebp: 35588128
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961520
registers.edi: 10
registers.eax: 2008080422
registers.ebp: 35588144
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961520
registers.edi: 9
registers.eax: 2008080422
registers.ebp: 35588160
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961520
registers.edi: 8
registers.eax: 2008080422
registers.ebp: 35588176
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961520
registers.edi: 7
registers.eax: 2008080422
registers.ebp: 35588192
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961520
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 35588208
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961520
registers.edi: 5
registers.eax: 2008080422
registers.ebp: 35588224
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961520
registers.edi: 4
registers.eax: 2008080422
registers.ebp: 35588240
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961520
registers.edi: 3
registers.eax: 2008080422
registers.ebp: 35588256
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961520
registers.edi: 2
registers.eax: 2008080422
registers.ebp: 35588272
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961520
registers.edi: 1
registers.eax: 2008080422
registers.ebp: 35588288
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:
DllRegisterServer+0xcbc7 yrbmplg+0x16937 @ 0x1e36937

exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1960712
registers.edi: 12
registers.eax: 2008080422
registers.ebp: 1961788
registers.edx: 23
registers.ebx: 1961804
registers.esi: 23
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961772
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 96784
registers.edx: 827898
registers.ebx: 0
registers.esi: 282
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961748
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 16
registers.edx: 0
registers.ebx: 64
registers.esi: 35591528
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961748
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 15
registers.edx: 0
registers.ebx: 64
registers.esi: 35591552
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961748
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 14
registers.edx: 0
registers.ebx: 64
registers.esi: 35591576
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961748
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 13
registers.edx: 0
registers.ebx: 64
registers.esi: 35591600
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961748
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 12
registers.edx: 0
registers.ebx: 64
registers.esi: 35591624
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961748
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 11
registers.edx: 0
registers.ebx: 64
registers.esi: 35591648
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961748
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 10
registers.edx: 0
registers.ebx: 64
registers.esi: 35591672
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961748
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 9
registers.edx: 0
registers.ebx: 64
registers.esi: 35591696
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961748
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 8
registers.edx: 0
registers.ebx: 64
registers.esi: 35591720
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961748
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 7
registers.edx: 0
registers.ebx: 64
registers.esi: 35591744
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961748
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 6
registers.edx: 0
registers.ebx: 64
registers.esi: 35591768
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961748
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 5
registers.edx: 0
registers.ebx: 64
registers.esi: 35591792
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961748
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 4
registers.edx: 0
registers.ebx: 64
registers.esi: 35591816
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961748
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 3
registers.edx: 0
registers.ebx: 64
registers.esi: 35591840
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961748
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 2
registers.edx: 0
registers.ebx: 64
registers.esi: 35591864
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1e3105c
registers.esp: 1961748
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 1
registers.edx: 0
registers.ebx: 64
registers.esi: 35591888
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1d7105c
registers.esp: 1896948
registers.edi: 3417960
registers.eax: 2008080422
registers.ebp: 2008154697
registers.edx: 129161
registers.ebx: 2704346981
registers.esi: 1990393856
registers.ecx: 66040
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1d7105c
registers.esp: 1896924
registers.edi: 16
registers.eax: 2008080422
registers.ebp: 8849360
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1d7105c
registers.esp: 1896924
registers.edi: 15
registers.eax: 2008080422
registers.ebp: 8849376
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1d7105c
registers.esp: 1896924
registers.edi: 14
registers.eax: 2008080422
registers.ebp: 8849392
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1d7105c
registers.esp: 1896924
registers.edi: 13
registers.eax: 2008080422
registers.ebp: 8849408
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1d7105c
registers.esp: 1896924
registers.edi: 12
registers.eax: 2008080422
registers.ebp: 8849424
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1d7105c
registers.esp: 1896924
registers.edi: 11
registers.eax: 2008080422
registers.ebp: 8849440
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1d7105c
registers.esp: 1896924
registers.edi: 10
registers.eax: 2008080422
registers.ebp: 8849456
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1d7105c
registers.esp: 1896924
registers.edi: 9
registers.eax: 2008080422
registers.ebp: 8849472
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1d7105c
registers.esp: 1896924
registers.edi: 8
registers.eax: 2008080422
registers.ebp: 8849488
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1d7105c
registers.esp: 1896924
registers.edi: 7
registers.eax: 2008080422
registers.ebp: 8849504
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1d7105c
registers.esp: 1896924
registers.edi: 6
registers.eax: 2008080422
registers.ebp: 8849520
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1d7105c
registers.esp: 1896924
registers.edi: 5
registers.eax: 2008080422
registers.ebp: 8849536
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1d7105c
registers.esp: 1896924
registers.edi: 4
registers.eax: 2008080422
registers.ebp: 8849552
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc c3 5d c3 33 c0 5d c3 68 e0 7d b6 c0 68 ea b3
exception.instruction: int3
exception.exception_code: 0x80000003
exception.symbol: DllRegisterServer+0x72ec yrbmplg+0x1105c
exception.address: 0x1d7105c
registers.esp: 1896924
registers.edi: 3
registers.eax: 2008080422
registers.ebp: 8849568
registers.edx: 0
registers.ebx: 0
registers.esi: 64
registers.ecx: 0
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2236
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01e4d000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2236
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73fe1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2236
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 24576
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01eb4000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2236
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007e0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2236
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007f0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2236
region_size: 614400
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01d40000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1080
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01d8d000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1080
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73fe1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1080
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 24576
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01df4000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1080
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00830000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1080
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00840000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1080
region_size: 614400
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00850000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2200
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0092d000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2200
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73fe1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2200
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 24576
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00994000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007b0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2200
region_size: 614400
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01fc0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0
Elastic malicious (high confidence)
SentinelOne Static AI - Suspicious PE
Sophos ML/PE-A
APEX Malicious
Microsoft Trojan:Win32/Gozi.GA!MTB
host 179.189.229.254
host 45.36.99.184