Summary | ZeroBOX

GoogleCrashHandler64.exe

EnigmaProtector UPX PE64 PE32 PE File MZP Format
Category Machine Started Completed
FILE s1_win7_x6403_us Dec. 12, 2023, 10:48 a.m. Dec. 12, 2023, 10:51 a.m.
Size 40.6MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c87e0ff27716ffd84d540965e457773e
SHA256 d9eeecc174bc8f60a5918e644ea5b541d1128d3b8d25d529d7e9e9bdf53194f1
CRC32 EE61482C
ssdeep 786432:wTBq1oUQ6K5lpILequze9Bsn2kMU/Y8WdSYIHUjozxLNMLJjcl+:wTBqm4eqXIMUWYYIHUjuKVjc
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
  • mzp_file_format - MZP(Delphi) file format
  • EnigmaProtector_IN - EnigmaProtector

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: chcp
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "dlIhost.exe"
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: '"C:\Windows\TEMP\dlIhost.exe"' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: "dlIhost.exe"
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "dlIhost.exe"
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: '"C:\Windows\TEMP\dlIhost.exe"' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: "dlIhost.exe"
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "dlIhost.exe"
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: '"C:\Windows\TEMP\dlIhost.exe"' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: "dlIhost.exe"
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "dlIhost.exe"
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: '"C:\Windows\TEMP\dlIhost.exe"' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: "dlIhost.exe"
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Active code page: 1252
console_handle: 0x00000013
1 1 0

WriteConsoleW

buffer: Waiting for 10
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: seconds, press a key to continue ...
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Waiting for 10
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: seconds, press a key to continue ...
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Waiting for 10
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: seconds, press a key to continue ...
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Waiting for 10
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: seconds, press a key to continue ...
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Waiting for 10
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: seconds, press a key to continue ...
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Waiting for 10
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: seconds, press a key to continue ...
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Waiting for 10
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: seconds, press a key to continue ...
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Waiting for 10
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: seconds, press a key to continue ...
console_handle: 0x00000007
1 1 0
section
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
googlecrashhandler64+0x1b495d @ 0x5b495d
googlecrashhandler64+0x1a714e @ 0x5a714e
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686684
registers.edi: 6889712
registers.eax: 0
registers.ebp: 2686712
registers.edx: 0
registers.ebx: 1270762678
registers.esi: 4296704
registers.ecx: 38550196
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1b495d @ 0x5b495d
googlecrashhandler64+0x1a714e @ 0x5a714e
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: 0f 0b e8 19 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf9700
exception.instruction: ud2
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc000001d
exception.offset: 1021696
exception.address: 0x4f9700
registers.esp: 2686684
registers.edi: 2686684
registers.eax: 0
registers.ebp: 2686712
registers.edx: 2
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686720
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1b495d @ 0x5b495d
googlecrashhandler64+0x1a714e @ 0x5a714e
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686684
registers.edi: 2686684
registers.eax: 0
registers.ebp: 2686712
registers.edx: 0
registers.ebx: 5216022
registers.esi: 0
registers.ecx: 2686720
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1b495d @ 0x5b495d
googlecrashhandler64+0x1a714e @ 0x5a714e
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686684
registers.edi: 2686684
registers.eax: 0
registers.ebp: 2686712
registers.edx: 0
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686720
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8a12 @ 0x5a8a12
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686620
registers.edi: 5683876
registers.eax: 0
registers.ebp: 2686648
registers.edx: 0
registers.ebx: 102400
registers.esi: 4296704
registers.ecx: 4296704
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8a12 @ 0x5a8a12
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 0
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8a12 @ 0x5a8a12
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: 0f 0b e8 19 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf9700
exception.instruction: ud2
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc000001d
exception.offset: 1021696
exception.address: 0x4f9700
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 2
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8a12 @ 0x5a8a12
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: 0f 0b e8 19 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf9700
exception.instruction: ud2
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc000001d
exception.offset: 1021696
exception.address: 0x4f9700
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 2
registers.ebx: 5216022
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8a12 @ 0x5a8a12
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: 0f 0b e8 19 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf9700
exception.instruction: ud2
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc000001d
exception.offset: 1021696
exception.address: 0x4f9700
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 2
registers.ebx: 5216022
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8d05 @ 0x5a8d05
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: 0f 0b e8 19 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf9700
exception.instruction: ud2
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc000001d
exception.offset: 1021696
exception.address: 0x4f9700
registers.esp: 2686620
registers.edi: 5683876
registers.eax: 0
registers.ebp: 2686648
registers.edx: 2
registers.ebx: 4
registers.esi: 4294967295
registers.ecx: 901276502
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8d05 @ 0x5a8d05
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 0
registers.ebx: 5216022
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8d05 @ 0x5a8d05
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: 0f 0b e8 19 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf9700
exception.instruction: ud2
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc000001d
exception.offset: 1021696
exception.address: 0x4f9700
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 2
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8d05 @ 0x5a8d05
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 0
registers.ebx: 5216022
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8d05 @ 0x5a8d05
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: 0f 0b e8 19 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf9700
exception.instruction: ud2
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc000001d
exception.offset: 1021696
exception.address: 0x4f9700
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 2
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8d2a @ 0x5a8d2a
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: cc 68 48 6e 14 21 e9 fc a5 fe ff 5f f2 5a 0b d5
exception.symbol: googlecrashhandler64+0x1b2de1
exception.instruction: int3
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0x80000003
exception.offset: 1781217
exception.address: 0x5b2de1
registers.esp: 2686620
registers.edi: 5655117
registers.eax: 2324
registers.ebp: 2686648
registers.edx: 2686656
registers.ebx: 4
registers.esi: 4294919751
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc 68 7a 5d 14 21 e9 54 c3 fe ff f4 46 ee 18 38
exception.symbol: googlecrashhandler64+0x1b1089
exception.instruction: int3
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0x80000003
exception.offset: 1773705
exception.address: 0x5b1089
registers.esp: 2686620
registers.edi: 5683876
registers.eax: 4
registers.ebp: 1111705675
registers.edx: 0
registers.ebx: 4
registers.esi: 4294967295
registers.ecx: 1377566720
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8e8e @ 0x5a8e8e
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: 0f 0b e8 19 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf9700
exception.instruction: ud2
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc000001d
exception.offset: 1021696
exception.address: 0x4f9700
registers.esp: 2686620
registers.edi: 5683876
registers.eax: 0
registers.ebp: 2686648
registers.edx: 2
registers.ebx: 4
registers.esi: 4294967295
registers.ecx: 0
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8e8e @ 0x5a8e8e
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 0
registers.ebx: 5216022
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8e8e @ 0x5a8e8e
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 0
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8e8e @ 0x5a8e8e
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 0
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8e8e @ 0x5a8e8e
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 0
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8e8e @ 0x5a8e8e
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: 0f 0b e8 19 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf9700
exception.instruction: ud2
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc000001d
exception.offset: 1021696
exception.address: 0x4f9700
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 2
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a8660 @ 0x5a8660
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: ed 68 8a 06 14 21 e9 bc a6 ff ff b0 53 b9 34 68
exception.symbol: googlecrashhandler64+0x1a2d21
exception.instruction: in eax, dx
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000096
exception.offset: 1715489
exception.address: 0x5a2d21
registers.esp: 2686608
registers.edi: 5683876
registers.eax: 1447909480
registers.ebp: 2686636
registers.edx: 22104
registers.ebx: 0
registers.esi: 5682560
registers.ecx: 10
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a867d @ 0x5a867d
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: 0f 3f 68 d8 48 14 21 e9 cb dd fe ff 72 76 7a 68
exception.symbol: googlecrashhandler64+0x1af611
exception.address: 0x5af611
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc000001d
exception.offset: 1766929
registers.esp: 2686608
registers.edi: 5683876
registers.eax: 1
registers.ebp: 2686636
registers.edx: 0
registers.ebx: 0
registers.esi: 5682560
registers.ecx: 0
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a9051 @ 0x5a9051
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686620
registers.edi: 5683876
registers.eax: 0
registers.ebp: 2686648
registers.edx: 0
registers.ebx: 4
registers.esi: 4294967295
registers.ecx: 3977992627
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a9051 @ 0x5a9051
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: 0f 0b e8 19 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf9700
exception.instruction: ud2
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc000001d
exception.offset: 1021696
exception.address: 0x4f9700
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 2
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a9051 @ 0x5a9051
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: 0f 0b e8 19 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf9700
exception.instruction: ud2
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc000001d
exception.offset: 1021696
exception.address: 0x4f9700
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 2
registers.ebx: 5216022
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a9051 @ 0x5a9051
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 0
registers.ebx: 5216022
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a9051 @ 0x5a9051
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: 0f 0b e8 19 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf9700
exception.instruction: ud2
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc000001d
exception.offset: 1021696
exception.address: 0x4f9700
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 2
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a914c @ 0x5a914c
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686620
registers.edi: 5683876
registers.eax: 0
registers.ebp: 2686648
registers.edx: 0
registers.ebx: 4
registers.esi: 4294967295
registers.ecx: 2450820498
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a914c @ 0x5a914c
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 0
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a914c @ 0x5a914c
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 0
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a914c @ 0x5a914c
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 0
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a914c @ 0x5a914c
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 0
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a914c @ 0x5a914c
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: 0f 0b e8 19 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf9700
exception.instruction: ud2
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc000001d
exception.offset: 1021696
exception.address: 0x4f9700
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 2
registers.ebx: 5215979
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:
googlecrashhandler64+0x1a914c @ 0x5a914c
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: f7 f0 e8 44 37 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: googlecrashhandler64+0xf96d5
exception.instruction: div eax
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000094
exception.offset: 1021653
exception.address: 0x4f96d5
registers.esp: 2686620
registers.edi: 2686620
registers.eax: 0
registers.ebp: 2686648
registers.edx: 0
registers.ebx: 5216022
registers.esi: 0
registers.ecx: 2686656
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc 68 7a 5d 14 21 e9 54 c3 fe ff f4 46 ee 18 38
exception.symbol: googlecrashhandler64+0x1b1089
exception.instruction: int3
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0x80000003
exception.offset: 1773705
exception.address: 0x5b1089
registers.esp: 50069268
registers.edi: 38694612
registers.eax: 4
registers.ebp: 1111705675
registers.edx: 0
registers.ebx: 38694696
registers.esi: 11
registers.ecx: 1377566720
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc 68 7a 5d 14 21 e9 54 c3 fe ff f4 46 ee 18 38
exception.symbol: googlecrashhandler64+0x1b1089
exception.instruction: int3
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0x80000003
exception.offset: 1773705
exception.address: 0x5b1089
registers.esp: 50069268
registers.edi: 38694612
registers.eax: 4
registers.ebp: 1111705675
registers.edx: 0
registers.ebx: 38694698
registers.esi: 11
registers.ecx: 1377566720
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc 68 7a 5d 14 21 e9 54 c3 fe ff f4 46 ee 18 38
exception.symbol: googlecrashhandler64+0x1b1089
exception.instruction: int3
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0x80000003
exception.offset: 1773705
exception.address: 0x5b1089
registers.esp: 50069268
registers.edi: 38694612
registers.eax: 4
registers.ebp: 1111705675
registers.edx: 0
registers.ebx: 38694700
registers.esi: 18
registers.ecx: 1377566720
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc 68 7a 5d 14 21 e9 54 c3 fe ff f4 46 ee 18 38
exception.symbol: googlecrashhandler64+0x1b1089
exception.instruction: int3
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0x80000003
exception.offset: 1773705
exception.address: 0x5b1089
registers.esp: 50069268
registers.edi: 38694612
registers.eax: 4
registers.ebp: 1111705675
registers.edx: 0
registers.ebx: 38694702
registers.esi: 18
registers.ecx: 1377566720
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc 68 7a 5d 14 21 e9 54 c3 fe ff f4 46 ee 18 38
exception.symbol: googlecrashhandler64+0x1b1089
exception.instruction: int3
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0x80000003
exception.offset: 1773705
exception.address: 0x5b1089
registers.esp: 50069268
registers.edi: 38694612
registers.eax: 4
registers.ebp: 1111705675
registers.edx: 0
registers.ebx: 38694704
registers.esi: 18
registers.ecx: 1377566720
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc 68 7a 5d 14 21 e9 54 c3 fe ff f4 46 ee 18 38
exception.symbol: googlecrashhandler64+0x1b1089
exception.instruction: int3
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0x80000003
exception.offset: 1773705
exception.address: 0x5b1089
registers.esp: 50069268
registers.edi: 38694612
registers.eax: 4
registers.ebp: 1111705675
registers.edx: 0
registers.ebx: 38694706
registers.esi: 18
registers.ecx: 1377566720
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc 68 7a 5d 14 21 e9 54 c3 fe ff f4 46 ee 18 38
exception.symbol: googlecrashhandler64+0x1b1089
exception.instruction: int3
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0x80000003
exception.offset: 1773705
exception.address: 0x5b1089
registers.esp: 50069268
registers.edi: 38694612
registers.eax: 4
registers.ebp: 1111705675
registers.edx: 0
registers.ebx: 38694708
registers.esi: 12
registers.ecx: 1377566720
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc 68 7a 5d 14 21 e9 54 c3 fe ff f4 46 ee 18 38
exception.symbol: googlecrashhandler64+0x1b1089
exception.instruction: int3
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0x80000003
exception.offset: 1773705
exception.address: 0x5b1089
registers.esp: 50069268
registers.edi: 38694612
registers.eax: 4
registers.ebp: 1111705675
registers.edx: 0
registers.ebx: 38694710
registers.esi: 12
registers.ecx: 1377566720
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc 68 7a 5d 14 21 e9 54 c3 fe ff f4 46 ee 18 38
exception.symbol: googlecrashhandler64+0x1b1089
exception.instruction: int3
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0x80000003
exception.offset: 1773705
exception.address: 0x5b1089
registers.esp: 50069268
registers.edi: 38694612
registers.eax: 4
registers.ebp: 1111705675
registers.edx: 0
registers.ebx: 38694712
registers.esi: 12
registers.ecx: 1377566720
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc 68 7a 5d 14 21 e9 54 c3 fe ff f4 46 ee 18 38
exception.symbol: googlecrashhandler64+0x1b1089
exception.instruction: int3
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0x80000003
exception.offset: 1773705
exception.address: 0x5b1089
registers.esp: 50069268
registers.edi: 38694612
registers.eax: 4
registers.ebp: 1111705675
registers.edx: 0
registers.ebx: 38694714
registers.esi: 12
registers.ecx: 1377566720
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc 68 7a 5d 14 21 e9 54 c3 fe ff f4 46 ee 18 38
exception.symbol: googlecrashhandler64+0x1b1089
exception.instruction: int3
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0x80000003
exception.offset: 1773705
exception.address: 0x5b1089
registers.esp: 50069268
registers.edi: 38694612
registers.eax: 4
registers.ebp: 1111705675
registers.edx: 0
registers.ebx: 38694716
registers.esi: 12
registers.ecx: 1377566720
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc 68 7a 5d 14 21 e9 54 c3 fe ff f4 46 ee 18 38
exception.symbol: googlecrashhandler64+0x1b1089
exception.instruction: int3
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0x80000003
exception.offset: 1773705
exception.address: 0x5b1089
registers.esp: 50069268
registers.edi: 38694612
registers.eax: 4
registers.ebp: 1111705675
registers.edx: 0
registers.ebx: 38694718
registers.esi: 12
registers.ecx: 1377566720
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc 68 7a 5d 14 21 e9 54 c3 fe ff f4 46 ee 18 38
exception.symbol: googlecrashhandler64+0x1b1089
exception.instruction: int3
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0x80000003
exception.offset: 1773705
exception.address: 0x5b1089
registers.esp: 50069268
registers.edi: 38694612
registers.eax: 4
registers.ebp: 1111705675
registers.edx: 0
registers.ebx: 38694720
registers.esi: 12
registers.ecx: 1377566720
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cc 68 7a 5d 14 21 e9 54 c3 fe ff f4 46 ee 18 38
exception.symbol: googlecrashhandler64+0x1b1089
exception.instruction: int3
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0x80000003
exception.offset: 1773705
exception.address: 0x5b1089
registers.esp: 50069268
registers.edi: 38694612
registers.eax: 4
registers.ebp: 1111705675
registers.edx: 0
registers.ebx: 38694722
registers.esi: 12
registers.ecx: 1377566720
1 0 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02260000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02490000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x008f0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00910000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00920000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02494000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 147456
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024a4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024c4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024d4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024d4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024d4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024d8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024d8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024d8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024d8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024d8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024d8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024d8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 1064960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02720000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024fc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024fc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024fc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024fc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024fc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024fc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024fc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024fc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024fc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024fc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024fc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024fc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024fc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024fc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2052
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
description GoogleCrashHandler64.exe tried to sleep 236 seconds, actually delayed analysis time by 236 seconds
file C:\Users\test22\AppData\Local\Temp\20523LC1.bat
file c:\Users\test22\AppData\Local\Temp\dlIhost.exe
cmdline cmd.exe /c ""C:\Users\test22\AppData\Local\Temp\20523LC1.bat" "C:\Users\test22\AppData\Local\Temp\GoogleCrashHandler64.exe" "
file C:\Users\test22\AppData\Local\Temp\dlIhost.exe
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
section {u'size_of_data': u'0x00004c00', u'virtual_address': u'0x00001000', u'entropy': 7.966686520940189, u'name': u'', u'virtual_size': u'0x00009000'} entropy 7.96668652094 description A section with a high entropy has been found
section {u'size_of_data': u'0x00000600', u'virtual_address': u'0x0000a000', u'entropy': 7.243572150232281, u'name': u'', u'virtual_size': u'0x00001000'} entropy 7.24357215023 description A section with a high entropy has been found
section {u'size_of_data': u'0x00000c00', u'virtual_address': u'0x00014000', u'entropy': 7.699935035646021, u'name': u'', u'virtual_size': u'0x00001000'} entropy 7.69993503565 description A section with a high entropy has been found
section {u'size_of_data': u'0x02796000', u'virtual_address': u'0x00019000', u'entropy': 7.99735283264246, u'name': u'', u'virtual_size': u'0x00291000'} entropy 7.99735283264 description A section with a high entropy has been found
section {u'size_of_data': u'0x000ef200', u'virtual_address': u'0x002aa000', u'entropy': 7.972339226716771, u'name': u'.data', u'virtual_size': u'0x000f0000'} entropy 7.97233922672 description A section with a high entropy has been found
entropy 0.999807340333 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
cmdline TASKLIST
cmdline chcp 1252
file \??\SICE
file \??\SIWDEBUG
file \??\NTICE
Time & API Arguments Status Return Repeated

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0
Time & API Arguments Status Return Repeated

__anomaly__

tid: 2876
message: Encountered 65537 exceptions, quitting.
subcategory: exception
function_name:
1 0 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
googlecrashhandler64+0x1a8660 @ 0x5a8660
googlecrashhandler64+0x1a715a @ 0x5a715a
googlecrashhandler64+0x291e32 @ 0x691e32

exception.instruction_r: ed 68 8a 06 14 21 e9 bc a6 ff ff b0 53 b9 34 68
exception.symbol: googlecrashhandler64+0x1a2d21
exception.instruction: in eax, dx
exception.module: GoogleCrashHandler64.exe
exception.exception_code: 0xc0000096
exception.offset: 1715489
exception.address: 0x5a2d21
registers.esp: 2686608
registers.edi: 5683876
registers.eax: 1447909480
registers.ebp: 2686636
registers.edx: 22104
registers.ebx: 0
registers.esi: 5682560
registers.ecx: 10
1 0 0
FireEye Generic.mg.c87e0ff27716ffd8
CrowdStrike win/malicious_confidence_100% (D)
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Packed.EnigmaProtector.M suspicious
APEX Malicious
ClamAV Win.Malware.Enigma-9857490-0
Avast Win32:Evo-gen [Trj]
Sophos Generic ML PUA (PUA)
F-Secure Adware.ADWARE/Adware.Gen
Trapmine malicious.high.ml.score
SentinelOne Static AI - Malicious PE
Google Detected
Avira ADWARE/Adware.Gen
Microsoft Backdoor:Win32/Bladabindi!ml
VBA32 Trojan.Tiggre
Cylance unsafe
Zoner Probably Heur.ExeHeaderL
Ikarus Trojan.Dropper.Agent
AVG Win32:Evo-gen [Trj]
DeepInstinct MALICIOUS