| Time & API |
Arguments |
Status |
Return |
Repeated |
1620738948.461124
NtResumeThread
|
thread_handle:
0x00000174
suspend_count:
1
process_identifier:
3048
|
success
|
0 |
0
|
1620738949.070124
CreateProcessInternalW
|
thread_identifier:
912
thread_handle:
0x00000294
process_identifier:
2144
current_directory:
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp
filepath:
C:\Windows\System32\cmd.exe
track:
1
command_line:
"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\4f2ac7edd1bda1c4e4d629b42ce590ef.exe" +s +h
filepath_r:
C:\Windows\System32\cmd.exe
stack_pivoted:
0
creation_flags:
67634192
(CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
process_handle:
0x000002d0
inherit_handles:
0
|
success
|
1 |
0
|
1620738949.148124
CreateProcessInternalW
|
thread_identifier:
2292
thread_handle:
0x00000294
process_identifier:
2308
current_directory:
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp
filepath:
C:\Windows\System32\cmd.exe
track:
1
command_line:
"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp" +s +h
filepath_r:
C:\Windows\System32\cmd.exe
stack_pivoted:
0
creation_flags:
67634192
(CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
process_handle:
0x000002a8
inherit_handles:
0
|
success
|
1 |
0
|
1620738949.320124
CreateProcessInternalW
|
thread_identifier:
2236
thread_handle:
0x00000294
process_identifier:
2240
current_directory:
filepath:
C:\Program Files (x86)\Internet Explorer\iexplore.exe
track:
1
command_line:
filepath_r:
C:\Program Files (x86)\Internet Explorer\iexplore.exe
stack_pivoted:
0
creation_flags:
4
(CREATE_SUSPENDED)
process_handle:
0x000002a8
inherit_handles:
0
|
success
|
1 |
0
|
1620738949.320124
NtGetContextThread
|
thread_handle:
0x00000294
|
success
|
0 |
0
|
1620738949.320124
NtAllocateVirtualMemory
|
process_identifier:
2240
region_size:
761856
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002a8
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00400000
|
failed
|
3221225496 |
0
|
1620738951.742124
CreateProcessInternalW
|
thread_identifier:
3176
thread_handle:
0x000002d8
process_identifier:
3172
current_directory:
filepath:
C:\Windows\explorer.exe
track:
1
command_line:
filepath_r:
C:\Windows\explorer.exe
stack_pivoted:
0
creation_flags:
4
(CREATE_SUSPENDED)
process_handle:
0x000002d4
inherit_handles:
0
|
success
|
1 |
0
|
1620738951.742124
NtGetContextThread
|
thread_handle:
0x000002d8
|
failed
|
3221225485 |
0
|
1620738953.070124
CreateProcessInternalW
|
thread_identifier:
3264
thread_handle:
0x000002dc
process_identifier:
3260
current_directory:
filepath:
track:
1
command_line:
notepad
filepath_r:
stack_pivoted:
0
creation_flags:
134217728
(CREATE_NO_WINDOW)
process_handle:
0x000002e4
inherit_handles:
0
|
success
|
1 |
0
|
1620738953.070124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x000f0000
|
success
|
0 |
0
|
1620738953.070124
WriteProcessMemory
|
process_identifier:
3260
buffer:
kernel32.dll
process_handle:
0x000002e4
base_address:
0x000f0000
|
success
|
1 |
0
|
1620738953.070124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00100000
|
success
|
0 |
0
|
1620738953.070124
WriteProcessMemory
|
process_identifier:
3260
buffer:
user32.dll
process_handle:
0x000002e4
base_address:
0x00100000
|
success
|
1 |
0
|
1620738953.070124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00110000
|
success
|
0 |
0
|
1620738953.070124
WriteProcessMemory
|
process_identifier:
3260
buffer:
Sleep
process_handle:
0x000002e4
base_address:
0x00110000
|
success
|
1 |
0
|
1620738953.070124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00120000
|
success
|
0 |
0
|
1620738953.070124
WriteProcessMemory
|
process_identifier:
3260
buffer:
MessageBoxA
process_handle:
0x000002e4
base_address:
0x00120000
|
success
|
1 |
0
|
1620738953.070124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00130000
|
success
|
0 |
0
|
1620738953.070124
WriteProcessMemory
|
process_identifier:
3260
buffer:
CreateProcessA
process_handle:
0x000002e4
base_address:
0x00130000
|
success
|
1 |
0
|
1620738953.070124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00140000
|
success
|
0 |
0
|
1620738953.070124
WriteProcessMemory
|
process_identifier:
3260
buffer:
GetLastError
process_handle:
0x000002e4
base_address:
0x00140000
|
success
|
1 |
0
|
1620738953.070124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00150000
|
success
|
0 |
0
|
1620738953.070124
WriteProcessMemory
|
process_identifier:
3260
buffer:
SetLastError
process_handle:
0x000002e4
base_address:
0x00150000
|
success
|
1 |
0
|
1620738953.070124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00160000
|
success
|
0 |
0
|
1620738953.070124
WriteProcessMemory
|
process_identifier:
3260
buffer:
CreateMutexA
process_handle:
0x000002e4
base_address:
0x00160000
|
success
|
1 |
0
|
1620738953.070124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x001b0000
|
success
|
0 |
0
|
1620738953.070124
WriteProcessMemory
|
process_identifier:
3260
buffer:
CloseHandle
process_handle:
0x000002e4
base_address:
0x001b0000
|
success
|
1 |
0
|
1620738953.070124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x001c0000
|
success
|
0 |
0
|
1620738953.070124
WriteProcessMemory
|
process_identifier:
3260
buffer:
ExitThread
process_handle:
0x000002e4
base_address:
0x001c0000
|
success
|
1 |
0
|
1620738953.070124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x001d0000
|
success
|
0 |
0
|
1620738953.070124
WriteProcessMemory
|
process_identifier:
3260
buffer:
OpenProcess
process_handle:
0x000002e4
base_address:
0x001d0000
|
success
|
1 |
0
|
1620738953.070124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x001e0000
|
success
|
0 |
0
|
1620738953.070124
WriteProcessMemory
|
process_identifier:
3260
buffer:
DCPERSFWBP
process_handle:
0x000002e4
base_address:
0x001e0000
|
success
|
1 |
0
|
1620738953.070124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x001f0000
|
success
|
0 |
0
|
1620738953.086124
WriteProcessMemory
|
process_identifier:
3260
buffer:
TerminateProcess
process_handle:
0x000002e4
base_address:
0x001f0000
|
success
|
1 |
0
|
1620738953.086124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00010000
|
success
|
0 |
0
|
1620738953.086124
WriteProcessMemory
|
process_identifier:
3260
buffer:
GetExitCodeProcess
process_handle:
0x000002e4
base_address:
0x00010000
|
success
|
1 |
0
|
1620738953.086124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00020000
|
success
|
0 |
0
|
1620738953.086124
WriteProcessMemory
|
process_identifier:
3260
buffer:
DC_MUTEX-RXJB8CR
process_handle:
0x000002e4
base_address:
0x00020000
|
success
|
1 |
0
|
1620738953.086124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00200000
|
success
|
0 |
0
|
1620738953.086124
WriteProcessMemory
|
process_identifier:
3260
buffer:
WaitForSingleObject
process_handle:
0x000002e4
base_address:
0x00200000
|
success
|
1 |
0
|
1620738953.086124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00210000
|
success
|
0 |
0
|
1620738953.086124
WriteProcessMemory
|
process_identifier:
3260
buffer:
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\4f2ac7edd1bda1c4e4d629b42ce590ef.exe
process_handle:
0x000002e4
base_address:
0x00210000
|
success
|
1 |
0
|
1620738953.086124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00220000
|
success
|
0 |
0
|
1620738953.086124
WriteProcessMemory
|
process_identifier:
3260
buffer:
×I5v"5vý_wÿ5vÀ5vr5v65v©5vÕØw5vØ6v5vM6vkL5v ! ¼
process_handle:
0x000002e4
base_address:
0x00220000
|
success
|
1 |
0
|
1620738953.086124
NtAllocateVirtualMemory
|
process_identifier:
3260
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000002e4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00230000
|
success
|
0 |
0
|
1620738953.086124
WriteProcessMemory
|
process_identifier:
3260
buffer:
UìĬSVW]C@PC8PÿPÿSCCDPC<PÿPÿSCCTPC8PÿPÿSCCXPC8PÿPÿSCCHPC8PÿPÿSCCLPC8PÿPÿSCCPPC8PÿPÿSC4C`PC8PÿPÿSC,ClPC8PÿPÿSC(ChPC8PÿPÿSC0CdPC8PÿPÿSC CpPC8PÿPÿSC$j ÿSCxPj j ÿS4ÿS=· u$C|Pj jÿS$ø
ÿtVWÿS0VWÿS(WÿS,j ÿS j ÿSC\Pj j ÿS4øÿS=· tRWÿS,ÇE¼D E¬PE¼Pj j j j j j CtPj ÿS
Àt3öhÈ E¬PÿSèsÎÿ
ötèë¼hÐ ÿSë²WÿS,hô ÿSë_^[å] UìÄ ÿÿÿSVWMôUøEüEüè3gýÿEøè+gýÿEôè#gýÿµtÿÿÿ3ÀUháõB dÿ0d
0ÿÿÿ3ɺD è%HýÿÇ
0ÿÿÿD Ç
\ÿÿÿ fÇ
`ÿÿÿ Eüè`¯ýÿÀu
EüºøõB èÃbýÿEøèG¯ýÿÀu
Uø3Àèÿýÿ¿ öB
ÿÿÿP
0ÿÿÿPj j h j j j EüèfýÿPj èSýÿ ÿÿÿºöB Ãè±÷ÿÿF8ºöB Ãè¢÷ÿÿF<º(öB Ãè÷ÿÿF@º0öB Ãè÷ÿÿFDº<öB Ãèu÷ÿÿFTºLöB Ãèf÷ÿÿFHº\öB ÃèW÷ÿÿFLºlöB ÃèH÷ÿÿFPº|öB Ãè9÷ÿÿF`ºöB Ãè*÷ÿÿFdºöB Ãè÷ÿÿFp×Ãè÷ÿÿFxº öB Ãè ÷ÿÿFlº´öB ÃèñöÿÿFhEôè²eýÿÐÃèÝöÿÿF\ºÈöB ÃèÎöÿÿFXEøèeýÿÐÃèºöÿÿFt
(ÿÿÿF|hÜöB hìöB èýÿPèýÿhøöB hìöB èýÿPèýÿFh(öB hìöB èhýÿPèjýÿFh0öB h÷B èPýÿPèRýÿFh|öB hìöB è8ýÿPè:ýÿF,h<öB hìöB è ýÿPè"ýÿFhLöB hìöB èýÿPè
ýÿFh\öB hìöB èð
ýÿPèò
ýÿFhlöB hìöB èØ
ýÿPèÚ
ýÿF4h´öB hìöB èÀ
ýÿPèÂ
ýÿF0höB hìöB è¨
ýÿPèª
ýÿF h öB hìöB è
ýÿPè
ýÿF(hÈöB hìöB èx
ýÿPèz
ýÿFhöB hìöB è`
ýÿPèb
ýÿF$h j κàðB Ãèöÿÿ3ÀZYYdhèõB Eôº èt_ýÿÃ
process_handle:
0x000002e4
base_address:
0x00230000
|
success
|
1 |
0
|
1620738953.086124
NtResumeThread
|
thread_handle:
0x000002f4
suspend_count:
1
process_identifier:
3048
|
success
|
0 |
0
|
1620738949.507124
CreateProcessInternalW
|
thread_identifier:
2668
thread_handle:
0x00000080
process_identifier:
1316
current_directory:
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp
filepath:
C:\Windows\System32\attrib.exe
track:
1
command_line:
attrib "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\4f2ac7edd1bda1c4e4d629b42ce590ef.exe" +s +h
filepath_r:
C:\Windows\system32\attrib.exe
stack_pivoted:
0
creation_flags:
524288
(EXTENDED_STARTUPINFO_PRESENT)
process_handle:
0x00000084
inherit_handles:
1
|
success
|
1 |
0
|
1620738949.523499
CreateProcessInternalW
|
thread_identifier:
3092
thread_handle:
0x00000080
process_identifier:
3088
current_directory:
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp
filepath:
C:\Windows\System32\attrib.exe
track:
1
command_line:
attrib "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp" +s +h
filepath_r:
C:\Windows\system32\attrib.exe
stack_pivoted:
0
creation_flags:
524288
(EXTENDED_STARTUPINFO_PRESENT)
process_handle:
0x00000084
inherit_handles:
1
|
success
|
1 |
0
|