Summary | ZeroBOX

nbtiapadkrtghja.exe

PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us March 30, 2025, 2:23 p.m. March 30, 2025, 2:27 p.m.
Size 1.2MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 e9c65505fb3b84a99839e30802ff4c6e
SHA256 829479e5883d4c8900c1e82aef7d25afd3effcdc119a309d0265891b2aa72597
CRC32 CBF67B45
ssdeep 24576:/JN9lCJLBSf6tDtrNc4phtybGBfGyuVW+h+GhzAMe4rogvUI:xvl6LBsiQA9cyu8m+An8
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0
section
packer BobSoft Mini Delphi -> BoB / BobSoft
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
nbtiapadkrtghja+0x1dabba @ 0x23abba
nbtiapadkrtghja+0x1de834 @ 0x23e834
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: 0f 0b e8 11 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f300
exception.instruction: ud2
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc000001d
exception.offset: 1176320
exception.address: 0x17f300
registers.esp: 7469984
registers.edi: 3322096
registers.eax: 0
registers.ebp: 7470012
registers.edx: 2
registers.ebx: 1725139846
registers.esi: 802816
registers.ecx: 36910992
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1dabba @ 0x23abba
nbtiapadkrtghja+0x1de834 @ 0x23e834
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: 0f 0b e8 11 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f300
exception.instruction: ud2
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc000001d
exception.offset: 1176320
exception.address: 0x17f300
registers.esp: 7469984
registers.edi: 7469984
registers.eax: 0
registers.ebp: 7470012
registers.edx: 2
registers.ebx: 1569558
registers.esi: 0
registers.ecx: 7470020
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d6a5a @ 0x236a5a
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: f7 f0 e8 3c 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f2d5
exception.instruction: div eax
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc0000094
exception.offset: 1176277
exception.address: 0x17f2d5
registers.esp: 7469912
registers.edi: 2118128
registers.eax: 0
registers.ebp: 7469940
registers.edx: 0
registers.ebx: 4291575808
registers.esi: 802816
registers.ecx: 802816
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d6a5a @ 0x236a5a
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: 0f 0b e8 11 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f300
exception.instruction: ud2
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc000001d
exception.offset: 1176320
exception.address: 0x17f300
registers.esp: 7469912
registers.edi: 7469912
registers.eax: 0
registers.ebp: 7469940
registers.edx: 2
registers.ebx: 1569515
registers.esi: 0
registers.ecx: 7469948
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d6a5a @ 0x236a5a
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: 0f 0b e8 11 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f300
exception.instruction: ud2
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc000001d
exception.offset: 1176320
exception.address: 0x17f300
registers.esp: 7469912
registers.edi: 7469912
registers.eax: 0
registers.ebp: 7469940
registers.edx: 2
registers.ebx: 1569558
registers.esi: 0
registers.ecx: 7469948
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d6a5a @ 0x236a5a
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: f7 f0 e8 3c 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f2d5
exception.instruction: div eax
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc0000094
exception.offset: 1176277
exception.address: 0x17f2d5
registers.esp: 7469912
registers.edi: 7469912
registers.eax: 0
registers.ebp: 7469940
registers.edx: 0
registers.ebx: 1569558
registers.esi: 0
registers.ecx: 7469948
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d6a5a @ 0x236a5a
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: 0f 0b e8 11 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f300
exception.instruction: ud2
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc000001d
exception.offset: 1176320
exception.address: 0x17f300
registers.esp: 7469912
registers.edi: 7469912
registers.eax: 0
registers.ebp: 7469940
registers.edx: 2
registers.ebx: 1569515
registers.esi: 0
registers.ecx: 7469948
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d6a5a @ 0x236a5a
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: f7 f0 e8 3c 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f2d5
exception.instruction: div eax
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc0000094
exception.offset: 1176277
exception.address: 0x17f2d5
registers.esp: 7469912
registers.edi: 7469912
registers.eax: 0
registers.ebp: 7469940
registers.edx: 0
registers.ebx: 1569558
registers.esi: 0
registers.ecx: 7469948
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d6cd2 @ 0x236cd2
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: f7 f0 e8 3c 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f2d5
exception.instruction: div eax
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc0000094
exception.offset: 1176277
exception.address: 0x17f2d5
registers.esp: 7469912
registers.edi: 2118128
registers.eax: 0
registers.ebp: 7469940
registers.edx: 0
registers.ebx: 4291575808
registers.esi: 802816
registers.ecx: 879778478
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d6cd2 @ 0x236cd2
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: 0f 0b e8 11 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f300
exception.instruction: ud2
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc000001d
exception.offset: 1176320
exception.address: 0x17f300
registers.esp: 7469912
registers.edi: 7469912
registers.eax: 0
registers.ebp: 7469940
registers.edx: 2
registers.ebx: 1569515
registers.esi: 0
registers.ecx: 7469948
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d6e2c @ 0x236e2c
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: 0f 0b e8 11 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f300
exception.instruction: ud2
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc000001d
exception.offset: 1176320
exception.address: 0x17f300
registers.esp: 7469912
registers.edi: 2118128
registers.eax: 0
registers.ebp: 7469940
registers.edx: 2
registers.ebx: 4291575808
registers.esi: 802816
registers.ecx: 7469940
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d6e2c @ 0x236e2c
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: 0f 0b e8 11 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f300
exception.instruction: ud2
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc000001d
exception.offset: 1176320
exception.address: 0x17f300
registers.esp: 7469912
registers.edi: 7469912
registers.eax: 0
registers.ebp: 7469940
registers.edx: 2
registers.ebx: 1569558
registers.esi: 0
registers.ecx: 7469948
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d6e2c @ 0x236e2c
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: 0f 0b e8 11 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f300
exception.instruction: ud2
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc000001d
exception.offset: 1176320
exception.address: 0x17f300
registers.esp: 7469912
registers.edi: 7469912
registers.eax: 0
registers.ebp: 7469940
registers.edx: 2
registers.ebx: 1569558
registers.esi: 0
registers.ecx: 7469948
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d6e2c @ 0x236e2c
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: 0f 0b e8 11 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f300
exception.instruction: ud2
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc000001d
exception.offset: 1176320
exception.address: 0x17f300
registers.esp: 7469912
registers.edi: 7469912
registers.eax: 0
registers.ebp: 7469940
registers.edx: 2
registers.ebx: 1569558
registers.esi: 0
registers.ecx: 7469948
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d6e2c @ 0x236e2c
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: 0f 0b e8 11 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f300
exception.instruction: ud2
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc000001d
exception.offset: 1176320
exception.address: 0x17f300
registers.esp: 7469912
registers.edi: 7469912
registers.eax: 0
registers.ebp: 7469940
registers.edx: 2
registers.ebx: 1569558
registers.esi: 0
registers.ecx: 7469948
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d6e2c @ 0x236e2c
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: f7 f0 e8 3c 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f2d5
exception.instruction: div eax
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc0000094
exception.offset: 1176277
exception.address: 0x17f2d5
registers.esp: 7469912
registers.edi: 7469912
registers.eax: 0
registers.ebp: 7469940
registers.edx: 0
registers.ebx: 1569558
registers.esi: 0
registers.ecx: 7469948
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d6e2c @ 0x236e2c
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: f7 f0 e8 3c 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f2d5
exception.instruction: div eax
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc0000094
exception.offset: 1176277
exception.address: 0x17f2d5
registers.esp: 7469912
registers.edi: 7469912
registers.eax: 0
registers.ebp: 7469940
registers.edx: 0
registers.ebx: 1569515
registers.esi: 0
registers.ecx: 7469948
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d701d @ 0x23701d
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: f7 f0 e8 3c 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f2d5
exception.instruction: div eax
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc0000094
exception.offset: 1176277
exception.address: 0x17f2d5
registers.esp: 7469912
registers.edi: 2118128
registers.eax: 0
registers.ebp: 7469940
registers.edx: 0
registers.ebx: 4291575808
registers.esi: 802816
registers.ecx: 690698259
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d701d @ 0x23701d
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: f7 f0 e8 3c 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f2d5
exception.instruction: div eax
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc0000094
exception.offset: 1176277
exception.address: 0x17f2d5
registers.esp: 7469912
registers.edi: 7469912
registers.eax: 0
registers.ebp: 7469940
registers.edx: 0
registers.ebx: 1569515
registers.esi: 0
registers.ecx: 7469948
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d7135 @ 0x237135
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: 0f 0b e8 11 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f300
exception.instruction: ud2
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc000001d
exception.offset: 1176320
exception.address: 0x17f300
registers.esp: 7469912
registers.edi: 2118128
registers.eax: 0
registers.ebp: 7469940
registers.edx: 2
registers.ebx: 4291575808
registers.esi: 802816
registers.ecx: 881586473
1 0 0

__exception__

stacktrace:
nbtiapadkrtghja+0x1d7135 @ 0x237135
nbtiapadkrtghja+0x1de846 @ 0x23e846
nbtiapadkrtghja+0x2caf53 @ 0x32af53

exception.instruction_r: f7 f0 e8 3c 2d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.symbol: nbtiapadkrtghja+0x11f2d5
exception.instruction: div eax
exception.module: nbtiapadkrtghja.exe
exception.exception_code: 0xc0000094
exception.offset: 1176277
exception.address: 0x17f2d5
registers.esp: 7469912
registers.edi: 7469912
registers.eax: 0
registers.ebp: 7469940
registers.edx: 0
registers.ebx: 1569558
registers.esi: 0
registers.ecx: 7469948
1 0 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02060000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02300000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x008e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00900000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00910000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02304000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02314000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 147456
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02314000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02334000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02344000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 49152
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02334000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02344000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02344000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 180224
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02344000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02344000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02344000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02344000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02344000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1212
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02348000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00028e00', u'virtual_address': u'0x00001000', u'entropy': 7.998707622918871, u'name': u'', u'virtual_size': u'0x0004e000'} entropy 7.99870762292 description A section with a high entropy has been found
section {u'size_of_data': u'0x00001000', u'virtual_address': u'0x0004f000', u'entropy': 7.914612909715114, u'name': u'', u'virtual_size': u'0x00003000'} entropy 7.91461290972 description A section with a high entropy has been found
section {u'size_of_data': u'0x00003400', u'virtual_address': u'0x00052000', u'entropy': 7.975692333984128, u'name': u'', u'virtual_size': u'0x0000e000'} entropy 7.97569233398 description A section with a high entropy has been found
section {u'size_of_data': u'0x00002200', u'virtual_address': u'0x00060000', u'entropy': 7.970212867904205, u'name': u'', u'virtual_size': u'0x00004000'} entropy 7.9702128679 description A section with a high entropy has been found
section {u'size_of_data': u'0x0002ba00', u'virtual_address': u'0x00064000', u'entropy': 7.998349881486038, u'name': u'', u'virtual_size': u'0x0027e000'} entropy 7.99834988149 description A section with a high entropy has been found
section {u'size_of_data': u'0x000e4e00', u'virtual_address': u'0x002e2000', u'entropy': 7.979672601443452, u'name': u'.data', u'virtual_size': u'0x000e5000'} entropy 7.97967260144 description A section with a high entropy has been found
entropy 1.0 description Overall entropy of this PE file is high
Bkav W32.AIDetectMalware
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win32.Generic.tc
ALYac Gen:Variant.Zusy.558157
Cylance Unsafe
VIPRE Gen:Variant.Zusy.558157
Sangfor Suspicious.Win32.Save.ins
CrowdStrike win/malicious_confidence_100% (D)
BitDefender Gen:Variant.Zusy.558157
K7GW Trojan ( 004b8ba01 )
K7AntiVirus Trojan ( 004b8ba01 )
Arcabit Trojan.Zusy.D8844D
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Packed.EnigmaProtector.J suspicious
APEX Malicious
Avast Win32:Evo-gen [Trj]
ClamAV Win.Dropper.njRAT-9244937-0
Kaspersky UDS:DangerousObject.Multi.Generic
MicroWorld-eScan Gen:Variant.Zusy.558157
Rising Trojan.Delf!8.67 (TFE:5:HKOyim908OD)
Emsisoft Gen:Variant.Zusy.558157 (B)
F-Secure Heuristic.HEUR/AGEN.1366259
McAfeeD Real Protect-LS!E9C65505FB3B
Trapmine malicious.high.ml.score
CTX exe.unknown.zusy
Sophos Generic ML PUA (PUA)
SentinelOne Static AI - Malicious PE
FireEye Generic.mg.e9c65505fb3b84a9
Google Detected
Avira HEUR/AGEN.1366259
Antiy-AVL GrayWare/Win32.EnigmaProtect.a
Kingsoft malware.kb.b.992
Gridinsoft Malware.Win32.Gen.bot!se12403
Microsoft Trojan:Win32/Caynamer.A!ml
GData Gen:Variant.Zusy.558157
AhnLab-V3 Trojan/Win.LummaStealer.R661243
DeepInstinct MALICIOUS
VBA32 Trojan.Inject
Malwarebytes Trojan.MalPack.Enigma
Ikarus Trojan.Crypt
Panda Trj/Genetic.gen
MaxSecure Trojan.Malware.300983.susgen
AVG Win32:Evo-gen [Trj]