Summary | ZeroBOX

nett.exe

Generic Malware Malicious Library UPX PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6401 Oct. 19, 2021, 9:18 a.m. Oct. 19, 2021, 9:35 a.m.
Size 4.4MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 400fba5ba55de726ed484ba680e74500
SHA256 5d91391caa4520c281f6b5cab65914417fed0445d836067c7f70c77795417af6
CRC32 FC95D7DC
ssdeep 98304:74AqGkgAo0Gkuv0VrN2OVDv4j24lilj1qn:74vlPqsrNAi9Un
PDB Path C:\personal\nhdev\366\official\binary\NetHack.PDB
Yara
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • Win32_Trojan_Gen_2_0904B0_Zero - Win32 Trojan Gen
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch
173.209.48.226 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\personal\nhdev\366\official\binary\NetHack.PDB
section .itext
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 8978432
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 1971173041
registers.ebx: 459282112
registers.esi: 3369227470
registers.ecx: 3703974148
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 9043968
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 9109504
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 9175040
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 9240576
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 9306112
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 9371648
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 9437184
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 9502720
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 9568256
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 9633792
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 9699328
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 9764864
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 9830400
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 9895936
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 9961472
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 10027008
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 10092544
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 10158080
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 10223616
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 10289152
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 10354688
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 10420224
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 10485760
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 10682368
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 459282112
registers.esi: 3369227470
registers.ecx: 141572
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 10747904
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 10813440
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 10878976
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 10944512
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 11010048
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 11075584
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 11141120
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 11206656
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 11272192
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 11337728
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 11403264
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 11468800
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 11534336
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 11599872
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 11665408
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 11730944
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 11796480
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 11862016
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 11927552
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 11993088
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 12058624
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 12124160
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 13828096
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 459282112
registers.esi: 3369227470
registers.ecx: 10500
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 14286848
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 459282112
registers.esi: 3369227470
registers.ecx: 10500
1 0 0

__exception__

stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol: nett+0x4858e7
exception.instruction: mov edi, dword ptr [edi + 0x1000]
exception.module: nett.exe
exception.exception_code: 0xc0000005
exception.offset: 4741351
exception.address: 0x8858e7
registers.esp: 850788
registers.edi: 14352384
registers.eax: 1768867074
registers.ebp: 850800
registers.edx: 2000598705
registers.ebx: 5824
registers.esi: 808142
registers.ecx: 796932
1 0 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2388
region_size: 503808
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00890000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2388
region_size: 1572864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02140000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2388
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x773bf000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2388
region_size: 208896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03420000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0
description nett.exe tried to sleep 135 seconds, actually delayed analysis time by 135 seconds
section {u'size_of_data': u'0x00035800', u'virtual_address': u'0x0041e000', u'entropy': 6.8079397611575665, u'name': u'.reloc', u'virtual_size': u'0x00035718'} entropy 6.80793976116 description A section with a high entropy has been found
section {u'size_of_data': u'0x00032800', u'virtual_address': u'0x00454000', u'entropy': 7.991934998132525, u'name': u'.itext', u'virtual_size': u'0x00032710'} entropy 7.99193499813 description A section with a high entropy has been found
Time & API Arguments Status Return Repeated

Process32NextW

snapshot_handle: 0x000000c0
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x000000c4
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x000000c8
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x000000cc
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x000000d0
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x000000d4
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x000000d8
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x000000dc
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x000000e0
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x000000e4
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x000000e8
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x000000ec
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x000000f0
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x000000f4
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x000000f8
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x000000fc
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x00000100
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x00000104
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x00000108
process_name: nett.exe
process_identifier: 2388
0 0

Process32NextW

snapshot_handle: 0x0000010c
process_name: nett.exe
process_identifier: 2388
0 0
host 173.209.48.226
McAfee Artemis!400FBA5BA55D
BitDefenderTheta Gen:NN.ZexaCO.34218.@F1@aqMBpgei
APEX Malicious
Paloalto generic.ml
Avast Win32:Malware-gen
McAfee-GW-Edition Artemis!Trojan
Webroot none
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Cynet Malicious (score: 100)
AVG Win32:Malware-gen
file C:\Users\test22\AppData\Roaming\:Zone.Identifier
dead_host 173.209.48.226:3360