Summary | ZeroBOX

dxw86.exe

Generic Malware PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 April 21, 2025, 1:13 p.m. April 21, 2025, 1:50 p.m.
Size 95.5KB
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5 f4a68f805fb3e6a31523ce43b7a5d1c3
SHA256 767d2672f229a9949591db5f245e947525df4d734b2db4cb9a1de749d545903a
CRC32 9ECE4CEE
ssdeep 1536:cVvwFmXVU9u8nEGEkt+sppGZvqLtsnlx8si7hcWyYnmrhnzFhrwEgG+z5xW0:cBwgFU951fMUtQxjUSWyCmr5z8EgG+zJ
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
41.216.188.98 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

__exception__

stacktrace:
dxw86+0x906e @ 0x12a906e
dxw86+0x1620e @ 0x12b620e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x755c33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.esp: 4585388
registers.edi: 4585794
registers.eax: 4585794
registers.ebp: 4585768
registers.edx: 4585460
registers.ebx: 0
registers.esi: 4585416
registers.ecx: 1995637124
1 0 0
host 41.216.188.98