8.2
高危

ae342c114820e463a4cd8a3eaef254a4cde8e9bfdcb673ea8853333be2f3bf29

6f66614585678c64534361a738378eee.exe

分析耗时

117s

最近分析

文件大小

696.5KB
静态报毒 动态报毒 100% 4562LL AI SCORE=85 AIDETECTVM ALI2000015 BSCOPE BTGCW7 CONFIDENCE DELF DELFINJECT DELPHILESS ELDORADO ELXR FAREIT HIGH CONFIDENCE HJZFYJ IGENT KCLOUD KTSE LCIGV LOKIBOT MALWARE2 MALWARE@#3260XXZYRLND1 NANOCORE NOON R + MAL RG0@A8RZIILI SCORE SIMDA STATIC AI SUSPICIOUS PE UHBAZCLLI UNSAFE WACATAC WRQS X2059 ZELPHIF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Fareit-FSK!6F6661458567 20201120 6.0.6.653
Alibaba Trojan:Win32/DelfInject.ali2000015 20190527 0.3.0.5
Avast Other:Malware-gen [Trj] 20201124 20.10.5736.0
Baidu 20190318 1.0.0.2
Kingsoft Win32.Troj.Undef.(kcloud) 20201124 2017.9.26.565
Tencent Msil.Worm.Autorun.Wrqs 20201124 1.0.0.1
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
静态指标
The executable contains unknown PE section names indicative of a packer (could be a false positive) (3 个事件)
section CODE
section DATA
section BSS
The executable uses a known packer (1 个事件)
packer BobSoft Mini Delphi -> BoB / BobSoft
One or more processes crashed (33 个事件)
Time & API Arguments Status Return Repeated
1619614390.825249
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 38534976
registers.edi: 0
registers.eax: 0
registers.ebp: 38535048
registers.edx: 53
registers.ebx: 0
registers.esi: 0
registers.ecx: 824
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614393.886499
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x7501e97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x7501ea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x7501b25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x7501b4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x7501ac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x7501aed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x75015511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x7501559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x75167f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x75164de3
6f66614585678c64534361a738378eee+0x5aa4d @ 0x45aa4d
6f66614585678c64534361a738378eee+0x53254 @ 0x453254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfced14ad
success 0 0
1619614392.214751
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 48234304
registers.edi: 0
registers.eax: 0
registers.ebp: 48234376
registers.edx: 53
registers.ebx: 0
registers.esi: 0
registers.ecx: 199
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614400.824999
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 38797120
registers.edi: 0
registers.eax: 0
registers.ebp: 38797192
registers.edx: 53
registers.ebx: 0
registers.esi: 0
registers.ecx: 824
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614402.589751
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x74f9e97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x74f9ea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x74f9b25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x74f9b4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x74f9ac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x74f9aed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x74f95511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x74f9559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x75007f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x75004de3
6f66614585678c64534361a738378eee+0x5aa4d @ 0x45aa4d
6f66614585678c64534361a738378eee+0x53254 @ 0x453254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfe9a14ad
success 0 0
1619614403.246374
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 39059264
registers.edi: 0
registers.eax: 0
registers.ebp: 39059336
registers.edx: 53
registers.ebx: 0
registers.esi: 0
registers.ecx: 246
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614406.949374
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 48889664
registers.edi: 0
registers.eax: 0
registers.ebp: 48889736
registers.edx: 53
registers.ebx: 0
registers.esi: 0
registers.ecx: 949
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614408.824374
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x745fe97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x745fea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x745fb25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x745fb4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x745fac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x745faed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x745f5511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x745f559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x74fb7f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x74fb4de3
6f66614585678c64534361a738378eee+0x5aa4d @ 0x45aa4d
6f66614585678c64534361a738378eee+0x53254 @ 0x453254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfe8c14ad
success 0 0
1619614408.964999
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 38338368
registers.edi: 0
registers.eax: 0
registers.ebp: 38338440
registers.edx: 53
registers.ebx: 0
registers.esi: 0
registers.ecx: 965
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614413.183999
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 38600512
registers.edi: 0
registers.eax: 0
registers.ebp: 38600584
registers.edx: 53
registers.ebx: 0
registers.esi: 0
registers.ecx: 183
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614415.011876
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x74f9e97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x74f9ea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x74f9b25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x74f9b4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x74f9ac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x74f9aed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x74f95511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x74f9559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x75007f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x75004de3
6f66614585678c64534361a738378eee+0x5aa4d @ 0x45aa4d
6f66614585678c64534361a738378eee+0x53254 @ 0x453254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfea514ad
success 0 0
1619614415.667626
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 38141760
registers.edi: 0
registers.eax: 0
registers.ebp: 38141832
registers.edx: 53
registers.ebx: 0
registers.esi: 0
registers.ecx: 652
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614420.012249
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 48693056
registers.edi: 0
registers.eax: 0
registers.ebp: 48693128
registers.edx: 53
registers.ebx: 0
registers.esi: 0
registers.ecx: 980
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614422.964626
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x745fe97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x745fea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x745fb25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x745fb4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x745fac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x745faed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x745f5511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x745f559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x74fb7f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x74fb4de3
6f66614585678c64534361a738378eee+0x5aa4d @ 0x45aa4d
6f66614585678c64534361a738378eee+0x53254 @ 0x453254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfea414ad
success 0 0
1619614423.105999
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 50069312
registers.edi: 0
registers.eax: 0
registers.ebp: 50069384
registers.edx: 53
registers.ebx: 0
registers.esi: 0
registers.ecx: 58
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614428.667999
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 37945152
registers.edi: 0
registers.eax: 0
registers.ebp: 37945224
registers.edx: 53
registers.ebx: 0
registers.esi: 0
registers.ecx: 668
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614430.872124
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x74f9e97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x74f9ea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x74f9b25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x74f9b4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x74f9ac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x74f9aed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x74f95511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x74f9559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x751b7f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x751b4de3
6f66614585678c64534361a738378eee+0x5aa4d @ 0x45aa4d
6f66614585678c64534361a738378eee+0x53254 @ 0x453254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfea514ad
success 0 0
1619614431.028249
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 38403904
registers.edi: 0
registers.eax: 0
registers.ebp: 38403976
registers.edx: 53
registers.ebx: 0
registers.esi: 0
registers.ecx: 27
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614434.996999
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 38993728
registers.edi: 0
registers.eax: 0
registers.ebp: 38993800
registers.edx: 53
registers.ebx: 0
registers.esi: 0
registers.ecx: 965
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614436.761374
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x745fe97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x745fea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x745fb25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x745fb4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x745fac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x745faed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x745f5511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x745f559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x75007f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x75004de3
6f66614585678c64534361a738378eee+0x5aa4d @ 0x45aa4d
6f66614585678c64534361a738378eee+0x53254 @ 0x453254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfea514ad
success 0 0
1619614437.106124
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 48037696
registers.edi: 0
registers.eax: 0
registers.ebp: 48037768
registers.edx: 53
registers.ebx: 0
registers.esi: 0
registers.ecx: 90
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614440.105751
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 48496448
registers.edi: 0
registers.eax: 0
registers.ebp: 48496520
registers.edx: 54
registers.ebx: 0
registers.esi: 0
registers.ecx: 105
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614441.965249
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x73fae97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x73faea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x73fab25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x73fab4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x73faac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x73faaed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x73fa5511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x73fa559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x74fc7f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x74fc4de3
6f66614585678c64534361a738378eee+0x5aa4d @ 0x45aa4d
6f66614585678c64534361a738378eee+0x53254 @ 0x453254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfe9714ad
success 0 0
1619614442.808501
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 48824128
registers.edi: 0
registers.eax: 0
registers.ebp: 48824200
registers.edx: 54
registers.ebx: 0
registers.esi: 0
registers.ecx: 793
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614446.167501
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 49217344
registers.edi: 0
registers.eax: 0
registers.ebp: 49217416
registers.edx: 54
registers.ebx: 0
registers.esi: 0
registers.ecx: 168
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614447.542751
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x74fae97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x74faea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x74fab25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x74fab4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x74faac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x74faaed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x74fa5511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x74fa559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x74617f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x74614de3
6f66614585678c64534361a738378eee+0x5aa4d @ 0x45aa4d
6f66614585678c64534361a738378eee+0x53254 @ 0x453254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfd0714ad
success 0 0
1619614448.574499
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 39714624
registers.edi: 0
registers.eax: 0
registers.ebp: 39714696
registers.edx: 54
registers.ebx: 0
registers.esi: 0
registers.ecx: 512
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614450.949751
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 48889664
registers.edi: 0
registers.eax: 0
registers.ebp: 48889736
registers.edx: 54
registers.ebx: 0
registers.esi: 0
registers.ecx: 949
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614453.199876
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x74f9e97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x74f9ea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x74f9b25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x74f9b4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x74f9ac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x74f9aed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x74f95511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x74f9559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x74617f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x74614de3
6f66614585678c64534361a738378eee+0x5aa4d @ 0x45aa4d
6f66614585678c64534361a738378eee+0x53254 @ 0x453254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfced14ad
success 0 0
1619614453.621374
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 48627520
registers.edi: 0
registers.eax: 0
registers.ebp: 48627592
registers.edx: 54
registers.ebx: 0
registers.esi: 0
registers.ecx: 605
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614457.058876
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 39124800
registers.edi: 0
registers.eax: 0
registers.ebp: 39124872
registers.edx: 54
registers.ebx: 0
registers.esi: 0
registers.ecx: 58
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
1619614458.871499
__exception__
stacktrace:
CreateFileMappingW+0xe5 OpenFileMappingW-0x29 kernelbase+0xdc73 @ 0x778edc73
GetFileVersion+0xa7 ND_RI2-0x2eb mscoreei+0xe97b @ 0x74f9e97b
GetFileVersion+0x1bb ND_RI2-0x1d7 mscoreei+0xea8f @ 0x74f9ea8f
RegisterShimImplCallback+0x48e5 CLRCreateInstance-0x13e6 mscoreei+0xb25a @ 0x74f9b25a
RegisterShimImplCallback+0x4b52 CLRCreateInstance-0x1179 mscoreei+0xb4c7 @ 0x74f9b4c7
RegisterShimImplCallback+0x4300 CLRCreateInstance-0x19cb mscoreei+0xac75 @ 0x74f9ac75
RegisterShimImplCallback+0x4561 CLRCreateInstance-0x176a mscoreei+0xaed6 @ 0x74f9aed6
CreateConfigStream+0xc89 _CorExeMain-0x62 mscoreei+0x5511 @ 0x74f95511
_CorExeMain+0x2b _CorExeMain2-0x141 mscoreei+0x559e @ 0x74f9559e
CreateConfigStream+0x13f GetProcessExecutableHeap-0xad6 mscoree+0x7f16 @ 0x74617f16
_CorExeMain+0x8 CreateConfigStream-0x2ff4 mscoree+0x4de3 @ 0x74614de3
6f66614585678c64534361a738378eee+0x5aa4d @ 0x45aa4d
6f66614585678c64534361a738378eee+0x53254 @ 0x453254
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 1634372
registers.edi: 2
registers.eax: 1
registers.ebp: 1634412
registers.edx: 228
registers.ebx: 983045
registers.esi: 1634532
registers.ecx: 228
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xfd2a14ad
success 0 0
1619614459.511999
__exception__
stacktrace:
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5

registers.esp: 38993728
registers.edi: 0
registers.eax: 0
registers.ebp: 38993800
registers.edx: 54
registers.ebx: 0
registers.esi: 0
registers.ecx: 512
exception.instruction_r: f7 f0 33 c0 5a 59 59 64 89 10 eb 55 e9 2f 37 fa
exception.symbol: 6f66614585678c64534361a738378eee+0x5ffc4
exception.instruction: div eax
exception.module: 6f66614585678c64534361a738378eee.exe
exception.exception_code: 0xc0000094
exception.offset: 393156
exception.address: 0x45ffc4
success 0 0
行为判定
动态指标
One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
HTTP traffic contains suspicious features which may be indicative of malware related traffic (1 个事件)
suspicious_features POST method with no referer header suspicious_request POST https://update.googleapis.com/service/update2?cup2key=10:3577043898&cup2hreq=0fc8370d28a814db0ee8fb99e1f50d34e5057abe647484148439f1bb70c61118
Performs some HTTP requests (4 个事件)
request HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
request HEAD http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619585537&mv=m&mvi=1&pl=23&shardbypass=yes
request HEAD http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=77cea889002a6593&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619585295&mv=m
request POST https://update.googleapis.com/service/update2?cup2key=10:3577043898&cup2hreq=0fc8370d28a814db0ee8fb99e1f50d34e5057abe647484148439f1bb70c61118
Sends data using the HTTP POST Method (1 个事件)
request POST https://update.googleapis.com/service/update2?cup2key=10:3577043898&cup2hreq=0fc8370d28a814db0ee8fb99e1f50d34e5057abe647484148439f1bb70c61118
Allocates read-write-execute memory (usually to unpack itself) (50 out of 363 个事件)
Time & API Arguments Status Return Repeated
1619614390.715249
NtAllocateVirtualMemory
process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x004c0000
success 0 0
1619614390.825249
NtAllocateVirtualMemory
process_identifier: 2636
region_size: 40960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x00560000
success 0 0
1619614390.840249
NtAllocateVirtualMemory
process_identifier: 2636
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x024c0000
success 0 0
1619614391.964499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00400000
success 0 0
1619614392.027499
NtAllocateVirtualMemory
process_identifier: 2764
region_size: 589824
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x00730000
success 0 0
1619614392.027499
NtAllocateVirtualMemory
process_identifier: 2764
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x00780000
success 0 0
1619614392.027499
NtAllocateVirtualMemory
process_identifier: 2764
region_size: 335872
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x006b0000
success 0 0
1619614392.027499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 307200
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x006b2000
success 0 0
1619614393.011499
NtAllocateVirtualMemory
process_identifier: 2764
region_size: 1769472
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x01fb0000
success 0 0
1619614393.011499
NtAllocateVirtualMemory
process_identifier: 2764
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02120000
success 0 0
1619614393.839499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x003c2000
success 0 0
1619614393.839499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619614393.839499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x003c2000
success 0 0
1619614393.839499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76353000
success 0 0
1619614393.855499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x003c2000
success 0 0
1619614393.855499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76354000
success 0 0
1619614393.855499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x003c2000
success 0 0
1619614393.855499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619614393.855499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x003c2000
success 0 0
1619614393.855499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x77d4f000
success 0 0
1619614393.855499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x003c2000
success 0 0
1619614393.855499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76353000
success 0 0
1619614393.855499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x003c2000
success 0 0
1619614393.855499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619614393.855499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x003c2000
success 0 0
1619614393.855499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619614393.855499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x003c2000
success 0 0
1619614393.855499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76354000
success 0 0
1619614393.855499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x003c2000
success 0 0
1619614393.855499
NtProtectVirtualMemory
process_identifier: 2764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619614392.152751
NtAllocateVirtualMemory
process_identifier: 2292
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x005d0000
success 0 0
1619614392.214751
NtAllocateVirtualMemory
process_identifier: 2292
region_size: 40960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x00630000
success 0 0
1619614392.230751
NtAllocateVirtualMemory
process_identifier: 2292
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x02f30000
success 0 0
1619614400.777999
NtAllocateVirtualMemory
process_identifier: 2452
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x020e0000
success 0 0
1619614400.824999
NtAllocateVirtualMemory
process_identifier: 2452
region_size: 40960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x02140000
success 0 0
1619614400.871999
NtAllocateVirtualMemory
process_identifier: 2452
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x022a0000
success 0 0
1619614402.199751
NtProtectVirtualMemory
process_identifier: 1888
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x00400000
success 0 0
1619614402.214751
NtAllocateVirtualMemory
process_identifier: 1888
region_size: 851968
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x01d90000
success 0 0
1619614402.214751
NtAllocateVirtualMemory
process_identifier: 1888
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x01e20000
success 0 0
1619614402.214751
NtAllocateVirtualMemory
process_identifier: 1888
region_size: 335872
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
base_address: 0x01d90000
success 0 0
1619614402.214751
NtProtectVirtualMemory
process_identifier: 1888
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 307200
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01d92000
success 0 0
1619614402.308751
NtAllocateVirtualMemory
process_identifier: 1888
region_size: 1245184
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 8192 (MEM_RESERVE)
base_address: 0x02020000
success 0 0
1619614402.308751
NtAllocateVirtualMemory
process_identifier: 1888
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x02110000
success 0 0
1619614402.527751
NtProtectVirtualMemory
process_identifier: 1888
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01e92000
success 0 0
1619614402.527751
NtProtectVirtualMemory
process_identifier: 1888
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76351000
success 0 0
1619614402.527751
NtProtectVirtualMemory
process_identifier: 1888
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01e92000
success 0 0
1619614402.527751
NtProtectVirtualMemory
process_identifier: 1888
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76353000
success 0 0
1619614402.527751
NtProtectVirtualMemory
process_identifier: 1888
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01e92000
success 0 0
1619614402.527751
NtProtectVirtualMemory
process_identifier: 1888
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x76354000
success 0 0
1619614402.527751
NtProtectVirtualMemory
process_identifier: 1888
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
base_address: 0x01e92000
success 0 0
Searches running processes potentially to identify processes for sandbox evasion, code injection or memory dumping (48 个事件)
The binary likely contains encrypted or compressed data indicative of a packer (3 个事件)
entropy 7.716038691329842 section {'size_of_data': '0x0000ac00', 'virtual_address': '0x00061000', 'entropy': 7.716038691329842, 'name': 'DATA', 'virtual_size': '0x0000aaf0'} description A section with a high entropy has been found
entropy 7.665504779730878 section {'size_of_data': '0x0003a800', 'virtual_address': '0x00079000', 'entropy': 7.665504779730878, 'name': '.rsrc', 'virtual_size': '0x0003a6d8'} description A section with a high entropy has been found
entropy 0.398274622573688 description Overall entropy of this PE file is high
Expresses interest in specific running processes (1 个事件)
process 6f66614585678c64534361a738378eee.exe
Repeatedly searches for a not-found process, you may want to run a web browser during analysis (22 个事件)
Time & API Arguments Status Return Repeated
1619614390.856249
Process32NextW
process_name: conhost.exe
snapshot_handle: 0x00000110
process_identifier: 2536
failed 0 0
1619614400.230751
Process32NextW
process_name: 6f66614585678c64534361a738378eee.exe
snapshot_handle: 0x000001f0
process_identifier: 2292
failed 0 0
1619614400.871999
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x00000114
process_identifier: 1880
failed 0 0
1619614405.933374
Process32NextW
process_name: 6f66614585678c64534361a738378eee.exe
snapshot_handle: 0x00000168
process_identifier: 520
failed 0 0
1619614406.996374
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x00000110
process_identifier: 192
failed 0 0
1619614412.464999
Process32NextW
process_name: 6f66614585678c64534361a738378eee.exe
snapshot_handle: 0x00000164
process_identifier: 2940
failed 0 0
1619614413.246999
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x00000110
process_identifier: 2796
failed 0 0
1619614419.261626
Process32NextW
process_name: 6f66614585678c64534361a738378eee.exe
snapshot_handle: 0x00000164
process_identifier: 2064
failed 0 0
1619614420.387249
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x00000110
process_identifier: 3184
failed 0 0
1619614428.324999
Process32NextW
process_name: dllhost.exe
snapshot_handle: 0x00000170
process_identifier: 3532
failed 0 0
1619614428.699999
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x00000110
process_identifier: 3632
failed 0 0
1619614434.403249
Process32NextW
process_name: GoogleUpdate.exe
snapshot_handle: 0x00000144
process_identifier: 3824
failed 0 0
1619614435.105999
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x00000110
process_identifier: 3924
failed 0 0
1619614439.465124
Process32NextW
process_name: 6f66614585678c64534361a738378eee.exe
snapshot_handle: 0x00000140
process_identifier: 4004
failed 0 0
1619614440.324751
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x00000110
process_identifier: 2856
failed 0 0
1619614445.011501
Process32NextW
process_name: 6f66614585678c64534361a738378eee.exe
snapshot_handle: 0x00000140
process_identifier: 3208
failed 0 0
1619614446.199501
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x00000110
process_identifier: 3620
failed 0 0
1619614450.121499
Process32NextW
process_name: mscorsvw.exe
snapshot_handle: 0x0000012c
process_identifier: 3648
failed 0 0
1619614450.980751
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x00000110
process_identifier: 3960
failed 0 0
1619614456.542374
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x00000168
process_identifier: 3192
failed 0 0
1619614457.105876
Process32NextW
process_name: inject-x86.exe
snapshot_handle: 0x00000110
process_identifier: 3524
failed 0 0
1619614464.167999
Process32NextW
process_name: sppsvc.exe
snapshot_handle: 0x00000184
process_identifier: 4020
failed 0 0
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Used NtSetContextThread to modify a thread in a remote process indicative of process injection (22 个事件)
Process injection Process 2636 called NtSetContextThread to modify thread in remote process 2764
Process injection Process 2452 called NtSetContextThread to modify thread in remote process 1888
Process injection Process 1760 called NtSetContextThread to modify thread in remote process 1324
Process injection Process 1272 called NtSetContextThread to modify thread in remote process 2648
Process injection Process 3128 called NtSetContextThread to modify thread in remote process 3304
Process injection Process 3572 called NtSetContextThread to modify thread in remote process 3644
Process injection Process 3868 called NtSetContextThread to modify thread in remote process 3940
Process injection Process 3076 called NtSetContextThread to modify thread in remote process 1564
Process injection Process 2188 called NtSetContextThread to modify thread in remote process 3676
Process injection Process 3628 called NtSetContextThread to modify thread in remote process 3988
Process injection Process 3584 called NtSetContextThread to modify thread in remote process 3496
Time & API Arguments Status Return Repeated
1619614391.184249
NtSetContextThread
thread_handle: 0x00000114
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 2764
success 0 0
1619614401.136999
NtSetContextThread
thread_handle: 0x00000118
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 1888
success 0 0
1619614407.230374
NtSetContextThread
thread_handle: 0x00000114
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 1324
success 0 0
1619614413.589999
NtSetContextThread
thread_handle: 0x00000114
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 2648
success 0 0
1619614421.247249
NtSetContextThread
thread_handle: 0x00000114
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3304
success 0 0
1619614429.605999
NtSetContextThread
thread_handle: 0x00000114
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3644
success 0 0
1619614435.511999
NtSetContextThread
thread_handle: 0x00000114
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3940
success 0 0
1619614440.761751
NtSetContextThread
thread_handle: 0x00000114
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 1564
success 0 0
1619614446.621501
NtSetContextThread
thread_handle: 0x00000114
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3676
success 0 0
1619614451.777751
NtSetContextThread
thread_handle: 0x00000114
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3988
success 0 0
1619614457.558876
NtSetContextThread
thread_handle: 0x00000114
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3496
success 0 0
Resumed a suspended thread in a remote process potentially indicative of process injection (22 个事件)
Process injection Process 2636 resumed a thread in remote process 2764
Process injection Process 2452 resumed a thread in remote process 1888
Process injection Process 1760 resumed a thread in remote process 1324
Process injection Process 1272 resumed a thread in remote process 2648
Process injection Process 3128 resumed a thread in remote process 3304
Process injection Process 3572 resumed a thread in remote process 3644
Process injection Process 3868 resumed a thread in remote process 3940
Process injection Process 3076 resumed a thread in remote process 1564
Process injection Process 2188 resumed a thread in remote process 3676
Process injection Process 3628 resumed a thread in remote process 3988
Process injection Process 3584 resumed a thread in remote process 3496
Time & API Arguments Status Return Repeated
1619614391.747249
NtResumeThread
thread_handle: 0x00000114
suspend_count: 1
process_identifier: 2764
success 0 0
1619614401.824999
NtResumeThread
thread_handle: 0x00000118
suspend_count: 1
process_identifier: 1888
success 0 0
1619614407.761374
NtResumeThread
thread_handle: 0x00000114
suspend_count: 1
process_identifier: 1324
success 0 0
1619614414.089999
NtResumeThread
thread_handle: 0x00000114
suspend_count: 1
process_identifier: 2648
success 0 0
1619614422.184249
NtResumeThread
thread_handle: 0x00000114
suspend_count: 1
process_identifier: 3304
success 0 0
1619614429.996999
NtResumeThread
thread_handle: 0x00000114
suspend_count: 1
process_identifier: 3644
success 0 0
1619614436.199999
NtResumeThread
thread_handle: 0x00000114
suspend_count: 1
process_identifier: 3940
success 0 0
1619614441.246751
NtResumeThread
thread_handle: 0x00000114
suspend_count: 1
process_identifier: 1564
success 0 0
1619614446.917501
NtResumeThread
thread_handle: 0x00000114
suspend_count: 1
process_identifier: 3676
success 0 0
1619614452.386751
NtResumeThread
thread_handle: 0x00000114
suspend_count: 1
process_identifier: 3988
success 0 0
1619614457.964876
NtResumeThread
thread_handle: 0x00000114
suspend_count: 1
process_identifier: 3496
success 0 0
Executed a process and injected code into it, probably while unpacking (50 out of 88 个事件)
Time & API Arguments Status Return Repeated
1619614391.059249
CreateProcessInternalW
thread_identifier: 2988
thread_handle: 0x00000114
process_identifier: 2764
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000118
inherit_handles: 0
success 1 0
1619614391.059249
NtUnmapViewOfSection
process_identifier: 2764
region_size: 4096
process_handle: 0x00000118
base_address: 0x00400000
success 0 0
1619614391.106249
NtMapViewOfSection
section_handle: 0x00000120
process_identifier: 2764
commit_size: 724992
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000118
allocation_type: 0 ()
section_offset: 0
view_size: 724992
base_address: 0x00400000
success 0 0
1619614391.184249
NtGetContextThread
thread_handle: 0x00000114
success 0 0
1619614391.184249
NtSetContextThread
thread_handle: 0x00000114
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 2764
success 0 0
1619614391.747249
NtResumeThread
thread_handle: 0x00000114
suspend_count: 1
process_identifier: 2764
success 0 0
1619614391.856249
CreateProcessInternalW
thread_identifier: 2248
thread_handle: 0x0000011c
process_identifier: 2292
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe" 2 2764 18089625
filepath_r:
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x0000012c
inherit_handles: 0
success 1 0
1619614400.371751
CreateProcessInternalW
thread_identifier: 2080
thread_handle: 0x000001f4
process_identifier: 2452
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x000001f8
inherit_handles: 0
success 1 0
1619614401.058999
CreateProcessInternalW
thread_identifier: 1916
thread_handle: 0x00000118
process_identifier: 1888
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x0000011c
inherit_handles: 0
success 1 0
1619614401.058999
NtUnmapViewOfSection
process_identifier: 1888
region_size: 4096
process_handle: 0x0000011c
base_address: 0x00400000
success 0 0
1619614401.074999
NtMapViewOfSection
section_handle: 0x00000124
process_identifier: 1888
commit_size: 724992
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x0000011c
allocation_type: 0 ()
section_offset: 0
view_size: 724992
base_address: 0x00400000
success 0 0
1619614401.136999
NtGetContextThread
thread_handle: 0x00000118
success 0 0
1619614401.136999
NtSetContextThread
thread_handle: 0x00000118
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 1888
success 0 0
1619614401.824999
NtResumeThread
thread_handle: 0x00000118
suspend_count: 1
process_identifier: 1888
success 0 0
1619614402.636999
CreateProcessInternalW
thread_identifier: 1272
thread_handle: 0x00000120
process_identifier: 520
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe" 2 1888 18099703
filepath_r:
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x00000130
inherit_handles: 0
success 1 0
1619614406.277374
CreateProcessInternalW
thread_identifier: 1060
thread_handle: 0x0000016c
process_identifier: 1760
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x00000170
inherit_handles: 0
success 1 0
1619614407.167374
CreateProcessInternalW
thread_identifier: 2064
thread_handle: 0x00000114
process_identifier: 1324
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000118
inherit_handles: 0
success 1 0
1619614407.167374
NtUnmapViewOfSection
process_identifier: 1324
region_size: 4096
process_handle: 0x00000118
base_address: 0x00400000
success 0 0
1619614407.183374
NtMapViewOfSection
section_handle: 0x00000120
process_identifier: 1324
commit_size: 724992
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000118
allocation_type: 0 ()
section_offset: 0
view_size: 724992
base_address: 0x00400000
success 0 0
1619614407.230374
NtGetContextThread
thread_handle: 0x00000114
success 0 0
1619614407.230374
NtSetContextThread
thread_handle: 0x00000114
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 1324
success 0 0
1619614407.761374
NtResumeThread
thread_handle: 0x00000114
suspend_count: 1
process_identifier: 1324
success 0 0
1619614408.339374
CreateProcessInternalW
thread_identifier: 2240
thread_handle: 0x0000011c
process_identifier: 2940
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe" 2 1324 18105640
filepath_r:
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x0000012c
inherit_handles: 0
success 1 0
1619614412.761999
CreateProcessInternalW
thread_identifier: 368
thread_handle: 0x00000168
process_identifier: 1272
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x0000016c
inherit_handles: 0
success 1 0
1619614413.527999
CreateProcessInternalW
thread_identifier: 2652
thread_handle: 0x00000114
process_identifier: 2648
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000118
inherit_handles: 0
success 1 0
1619614413.527999
NtUnmapViewOfSection
process_identifier: 2648
region_size: 4096
process_handle: 0x00000118
base_address: 0x00400000
success 0 0
1619614413.542999
NtMapViewOfSection
section_handle: 0x00000120
process_identifier: 2648
commit_size: 724992
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000118
allocation_type: 0 ()
section_offset: 0
view_size: 724992
base_address: 0x00400000
success 0 0
1619614413.589999
NtGetContextThread
thread_handle: 0x00000114
success 0 0
1619614413.589999
NtSetContextThread
thread_handle: 0x00000114
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 2648
success 0 0
1619614414.089999
NtResumeThread
thread_handle: 0x00000114
suspend_count: 1
process_identifier: 2648
success 0 0
1619614414.902999
CreateProcessInternalW
thread_identifier: 3036
thread_handle: 0x0000011c
process_identifier: 2064
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe" 2 2648 18111968
filepath_r:
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x0000012c
inherit_handles: 0
success 1 0
1619614419.527626
CreateProcessInternalW
thread_identifier: 3132
thread_handle: 0x00000168
process_identifier: 3128
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x0000016c
inherit_handles: 0
success 1 0
1619614421.075249
CreateProcessInternalW
thread_identifier: 3308
thread_handle: 0x00000114
process_identifier: 3304
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000118
inherit_handles: 0
success 1 0
1619614421.075249
NtUnmapViewOfSection
process_identifier: 3304
region_size: 4096
process_handle: 0x00000118
base_address: 0x00400000
success 0 0
1619614421.137249
NtMapViewOfSection
section_handle: 0x00000120
process_identifier: 3304
commit_size: 724992
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000118
allocation_type: 0 ()
section_offset: 0
view_size: 724992
base_address: 0x00400000
success 0 0
1619614421.247249
NtGetContextThread
thread_handle: 0x00000114
success 0 0
1619614421.247249
NtSetContextThread
thread_handle: 0x00000114
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3304
success 0 0
1619614422.184249
NtResumeThread
thread_handle: 0x00000114
suspend_count: 1
process_identifier: 3304
success 0 0
1619614422.340249
CreateProcessInternalW
thread_identifier: 3368
thread_handle: 0x0000011c
process_identifier: 3364
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe" 2 3304 18120062
filepath_r:
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x0000012c
inherit_handles: 0
success 1 0
1619614428.433999
CreateProcessInternalW
thread_identifier: 3576
thread_handle: 0x00000174
process_identifier: 3572
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x00000178
inherit_handles: 0
success 1 0
1619614429.058999
CreateProcessInternalW
thread_identifier: 3648
thread_handle: 0x00000114
process_identifier: 3644
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000118
inherit_handles: 0
success 1 0
1619614429.058999
NtUnmapViewOfSection
process_identifier: 3644
region_size: 4096
process_handle: 0x00000118
base_address: 0x00400000
success 0 0
1619614429.074999
NtMapViewOfSection
section_handle: 0x00000120
process_identifier: 3644
commit_size: 724992
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
process_handle: 0x00000118
allocation_type: 0 ()
section_offset: 0
view_size: 724992
base_address: 0x00400000
success 0 0
1619614429.605999
NtGetContextThread
thread_handle: 0x00000114
success 0 0
1619614429.605999
NtSetContextThread
thread_handle: 0x00000114
registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4911072
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
process_identifier: 3644
success 0 0
1619614429.996999
NtResumeThread
thread_handle: 0x00000114
suspend_count: 1
process_identifier: 3644
success 0 0
1619614430.246999
CreateProcessInternalW
thread_identifier: 3708
thread_handle: 0x0000011c
process_identifier: 3704
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe" 2 3644 18127875
filepath_r:
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x0000012c
inherit_handles: 0
success 1 0
1619614434.528249
CreateProcessInternalW
thread_identifier: 3872
thread_handle: 0x00000148
process_identifier: 3868
current_directory:
filepath: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe
stack_pivoted: 0
creation_flags: 32 (NORMAL_PRIORITY_CLASS)
process_handle: 0x0000014c
inherit_handles: 0
success 1 0
1619614435.386999
CreateProcessInternalW
thread_identifier: 3944
thread_handle: 0x00000114
process_identifier: 3940
current_directory:
filepath:
track: 1
command_line: "C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\6f66614585678c64534361a738378eee.exe"
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
process_handle: 0x00000118
inherit_handles: 0
success 1 0
1619614435.386999
NtUnmapViewOfSection
process_identifier: 3940
region_size: 4096
process_handle: 0x00000118
base_address: 0x00400000
success 0 0
File has been identified by 64 AntiVirus engines on VirusTotal as malicious (50 out of 64 个事件)
Bkav W32.AIDetectVM.malware2
Elastic malicious (high confidence)
DrWeb Trojan.Nanocore.23
MicroWorld-eScan Trojan.Delf.FareIt.Gen.6
FireEye Generic.mg.6f66614585678c64
CAT-QuickHeal Trojanspy.Noon
McAfee Fareit-FSK!6F6661458567
Cylance Unsafe
Zillya Trojan.Injector.Win32.728771
SUPERAntiSpyware Trojan.Agent/Gen-FareIt
Sangfor Malware
K7AntiVirus Trojan ( 005685fc1 )
Alibaba Trojan:Win32/DelfInject.ali2000015
K7GW Trojan ( 005685fc1 )
Cybereason malicious.7d4eaf
Arcabit Trojan.Delf.FareIt.Gen.6
BitDefenderTheta Gen:NN.ZelphiF.34634.RG0@a8RZiIli
Cyren W32/Delf.KP.gen!Eldorado
Symantec Trojan.Gen.MBT
ESET-NOD32 MSIL/Autorun.Spy.Agent.DF
APEX Malicious
Paloalto generic.ml
ClamAV Win.Dropper.LokiBot-7776681-0
Kaspersky HEUR:Trojan-Spy.Win32.Noon.gen
BitDefender Trojan.Delf.FareIt.Gen.6
NANO-Antivirus Trojan.Win32.Nanocore.hjzfyj
Avast Other:Malware-gen [Trj]
Rising Trojan.Injector!8.C4 (KTSE)
Ad-Aware Trojan.Delf.FareIt.Gen.6
Emsisoft Trojan.Delf.FareIt.Gen.6 (B)
Comodo Malware@#3260xxzyrlnd1
F-Secure Trojan.TR/Agent.lcigv
VIPRE Trojan.Win32.Simda.ba (v)
TrendMicro TrojanSpy.Win32.FAREIT.UHBAZCLLI
McAfee-GW-Edition Fareit-FSK!6F6661458567
Sophos Mal/Generic-R + Mal/Fareit-AA
SentinelOne Static AI - Suspicious PE
Jiangmin TrojanSpy.Noon.ppk
Avira TR/Agent.lcigv
MAX malware (ai score=85)
Antiy-AVL Trojan/Win32.Wacatac
Kingsoft Win32.Troj.Undef.(kcloud)
Gridinsoft Trojan.Win32.Packed.dd!n
Microsoft Trojan:Win32/InfoStealer.C!MTB
AegisLab Trojan.Win32.Noon.l!c
ZoneAlarm HEUR:Trojan-Spy.Win32.Noon.gen
GData Win32.Trojan.Agent.4562LL
Cynet Malicious (score: 100)
AhnLab-V3 Suspicious/Win.Delphiless.X2059
ALYac Trojan.Delf.FareIt.Gen.6
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-06-20 06:22:17

Imports

Library kernel32.dll:
0x46d164 VirtualFree
0x46d168 VirtualAlloc
0x46d16c LocalFree
0x46d170 LocalAlloc
0x46d174 GetVersion
0x46d178 GetCurrentThreadId
0x46d184 VirtualQuery
0x46d188 WideCharToMultiByte
0x46d190 MultiByteToWideChar
0x46d194 lstrlenA
0x46d198 lstrcpynA
0x46d19c LoadLibraryExA
0x46d1a0 GetThreadLocale
0x46d1a4 GetStartupInfoA
0x46d1a8 GetProcAddress
0x46d1ac GetModuleHandleA
0x46d1b0 GetModuleFileNameA
0x46d1b4 GetLocaleInfoA
0x46d1b8 GetLastError
0x46d1c0 GetCommandLineA
0x46d1c4 FreeLibrary
0x46d1c8 FindFirstFileA
0x46d1cc FindClose
0x46d1d0 ExitProcess
0x46d1d4 WriteFile
0x46d1dc RtlUnwind
0x46d1e0 RaiseException
0x46d1e4 GetStdHandle
Library user32.dll:
0x46d1ec GetKeyboardType
0x46d1f0 LoadStringA
0x46d1f4 MessageBoxA
0x46d1f8 CharNextA
Library advapi32.dll:
0x46d200 RegQueryValueExA
0x46d204 RegOpenKeyExA
0x46d208 RegCloseKey
Library oleaut32.dll:
0x46d210 SysFreeString
0x46d214 SysReAllocStringLen
0x46d218 SysAllocStringLen
Library kernel32.dll:
0x46d220 TlsSetValue
0x46d224 TlsGetValue
0x46d228 LocalAlloc
0x46d22c GetModuleHandleA
Library advapi32.dll:
0x46d234 RegQueryValueExA
0x46d238 RegOpenKeyExA
0x46d23c RegCloseKey
Library kernel32.dll:
0x46d244 lstrcpyA
0x46d248 lstrcmpA
0x46d24c WriteFile
0x46d254 WaitForSingleObject
0x46d258 VirtualQuery
0x46d25c VirtualAlloc
0x46d260 Sleep
0x46d264 SizeofResource
0x46d268 SetThreadLocale
0x46d26c SetFilePointer
0x46d270 SetEvent
0x46d274 SetErrorMode
0x46d278 SetEndOfFile
0x46d27c ResetEvent
0x46d280 ReadFile
0x46d284 MulDiv
0x46d288 LockResource
0x46d28c LoadResource
0x46d290 LoadLibraryA
0x46d29c GlobalUnlock
0x46d2a0 GlobalReAlloc
0x46d2a4 GlobalHandle
0x46d2a8 GlobalLock
0x46d2ac GlobalFree
0x46d2b0 GlobalFindAtomA
0x46d2b4 GlobalDeleteAtom
0x46d2b8 GlobalAlloc
0x46d2bc GlobalAddAtomA
0x46d2c4 GetVersionExA
0x46d2c8 GetVersion
0x46d2cc GetTickCount
0x46d2d0 GetThreadLocale
0x46d2d8 GetSystemTime
0x46d2dc GetSystemInfo
0x46d2e0 GetStringTypeExA
0x46d2e4 GetStdHandle
0x46d2e8 GetProcAddress
0x46d2ec GetModuleHandleA
0x46d2f0 GetModuleFileNameA
0x46d2f4 GetLogicalDrives
0x46d2f8 GetLocaleInfoA
0x46d2fc GetLocalTime
0x46d300 GetLastError
0x46d304 GetFullPathNameA
0x46d308 GetFileAttributesA
0x46d30c GetDriveTypeA
0x46d310 GetDiskFreeSpaceA
0x46d314 GetDateFormatA
0x46d318 GetCurrentThreadId
0x46d31c GetCurrentProcessId
0x46d320 GetCPInfo
0x46d324 GetACP
0x46d328 FreeResource
0x46d32c InterlockedExchange
0x46d330 FreeLibrary
0x46d334 FormatMessageA
0x46d338 FindResourceA
0x46d33c FindNextFileA
0x46d340 FindFirstFileA
0x46d344 FindClose
0x46d354 ExitThread
0x46d358 ExitProcess
0x46d35c EnumCalendarInfoA
0x46d368 CreateThread
0x46d36c CreateFileA
0x46d370 CreateEventA
0x46d374 CompareStringA
0x46d378 CloseHandle
Library mpr.dll:
0x46d380 WNetGetConnectionA
Library version.dll:
0x46d388 VerQueryValueA
0x46d390 GetFileVersionInfoA
Library gdi32.dll:
0x46d398 UnrealizeObject
0x46d39c StretchBlt
0x46d3a0 SetWindowOrgEx
0x46d3a4 SetViewportOrgEx
0x46d3a8 SetTextColor
0x46d3ac SetStretchBltMode
0x46d3b0 SetROP2
0x46d3b4 SetPixel
0x46d3b8 SetDIBColorTable
0x46d3bc SetBrushOrgEx
0x46d3c0 SetBkMode
0x46d3c4 SetBkColor
0x46d3c8 SelectPalette
0x46d3cc SelectObject
0x46d3d0 SaveDC
0x46d3d4 RestoreDC
0x46d3d8 Rectangle
0x46d3dc RectVisible
0x46d3e0 RealizePalette
0x46d3e4 PatBlt
0x46d3e8 MoveToEx
0x46d3ec MaskBlt
0x46d3f0 LineTo
0x46d3f4 IntersectClipRect
0x46d3f8 GetWindowOrgEx
0x46d3fc GetTextMetricsA
0x46d408 GetStockObject
0x46d40c GetPixel
0x46d410 GetPaletteEntries
0x46d414 GetObjectA
0x46d418 GetDeviceCaps
0x46d41c GetDIBits
0x46d420 GetDIBColorTable
0x46d424 GetDCOrgEx
0x46d42c GetClipBox
0x46d430 GetBrushOrgEx
0x46d434 GetBitmapBits
0x46d438 ExtTextOutA
0x46d43c ExcludeClipRect
0x46d440 DeleteObject
0x46d444 DeleteDC
0x46d448 CreateSolidBrush
0x46d44c CreatePenIndirect
0x46d450 CreatePalette
0x46d458 CreateFontIndirectA
0x46d45c CreateDIBitmap
0x46d460 CreateDIBSection
0x46d464 CreateCompatibleDC
0x46d46c CreateBrushIndirect
0x46d470 CreateBitmap
0x46d474 BitBlt
Library opengl32.dll:
0x46d47c wglCreateContext
Library user32.dll:
0x46d484 CreateWindowExA
0x46d488 WindowFromPoint
0x46d48c WinHelpA
0x46d490 WaitMessage
0x46d494 UpdateWindow
0x46d498 UnregisterClassA
0x46d49c UnhookWindowsHookEx
0x46d4a0 TranslateMessage
0x46d4a8 TrackPopupMenu
0x46d4b0 ShowWindow
0x46d4b4 ShowScrollBar
0x46d4b8 ShowOwnedPopups
0x46d4bc ShowCursor
0x46d4c0 SetWindowsHookExA
0x46d4c4 SetWindowTextA
0x46d4c8 SetWindowPos
0x46d4cc SetWindowPlacement
0x46d4d0 SetWindowLongA
0x46d4d4 SetTimer
0x46d4d8 SetScrollRange
0x46d4dc SetScrollPos
0x46d4e0 SetScrollInfo
0x46d4e4 SetRect
0x46d4e8 SetPropA
0x46d4ec SetParent
0x46d4f0 SetMenuItemInfoA
0x46d4f4 SetMenu
0x46d4f8 SetForegroundWindow
0x46d4fc SetFocus
0x46d500 SetCursor
0x46d504 SetClassLongA
0x46d508 SetCapture
0x46d50c SetActiveWindow
0x46d510 SendMessageA
0x46d514 ScrollWindow
0x46d518 ScreenToClient
0x46d51c RemovePropA
0x46d520 RemoveMenu
0x46d524 ReleaseDC
0x46d528 ReleaseCapture
0x46d534 RegisterClassA
0x46d538 RedrawWindow
0x46d53c PtInRect
0x46d540 PostQuitMessage
0x46d544 PostMessageA
0x46d548 PeekMessageA
0x46d54c OffsetRect
0x46d550 OemToCharA
0x46d554 MessageBoxA
0x46d558 MapWindowPoints
0x46d55c MapVirtualKeyA
0x46d560 LoadStringA
0x46d564 LoadKeyboardLayoutA
0x46d568 LoadIconA
0x46d56c LoadCursorA
0x46d570 LoadBitmapA
0x46d574 KillTimer
0x46d578 IsZoomed
0x46d57c IsWindowVisible
0x46d580 IsWindowEnabled
0x46d584 IsWindow
0x46d588 IsRectEmpty
0x46d58c IsIconic
0x46d590 IsDialogMessageA
0x46d594 IsChild
0x46d598 InvalidateRect
0x46d59c IntersectRect
0x46d5a0 InsertMenuItemA
0x46d5a4 InsertMenuA
0x46d5a8 InflateRect
0x46d5b0 GetWindowTextA
0x46d5b4 GetWindowRect
0x46d5b8 GetWindowPlacement
0x46d5bc GetWindowLongA
0x46d5c0 GetWindowDC
0x46d5c4 GetTopWindow
0x46d5c8 GetSystemMetrics
0x46d5cc GetSystemMenu
0x46d5d0 GetSysColorBrush
0x46d5d4 GetSysColor
0x46d5d8 GetSubMenu
0x46d5dc GetScrollRange
0x46d5e0 GetScrollPos
0x46d5e4 GetScrollInfo
0x46d5e8 GetPropA
0x46d5ec GetParent
0x46d5f0 GetWindow
0x46d5f4 GetMenuStringA
0x46d5f8 GetMenuState
0x46d5fc GetMenuItemInfoA
0x46d600 GetMenuItemID
0x46d604 GetMenuItemCount
0x46d608 GetMenu
0x46d60c GetLastActivePopup
0x46d610 GetKeyboardState
0x46d618 GetKeyboardLayout
0x46d61c GetKeyState
0x46d620 GetKeyNameTextA
0x46d624 GetIconInfo
0x46d628 GetForegroundWindow
0x46d62c GetFocus
0x46d630 GetDesktopWindow
0x46d634 GetDCEx
0x46d638 GetDC
0x46d63c GetCursorPos
0x46d640 GetCursor
0x46d644 GetClientRect
0x46d648 GetClassNameA
0x46d64c GetClassInfoA
0x46d650 GetCapture
0x46d654 GetActiveWindow
0x46d658 FrameRect
0x46d65c FindWindowA
0x46d660 FillRect
0x46d664 EqualRect
0x46d668 EnumWindows
0x46d66c EnumThreadWindows
0x46d670 EndPaint
0x46d674 EnableWindow
0x46d678 EnableScrollBar
0x46d67c EnableMenuItem
0x46d680 DrawTextA
0x46d684 DrawMenuBar
0x46d688 DrawIconEx
0x46d68c DrawIcon
0x46d690 DrawFrameControl
0x46d694 DrawFocusRect
0x46d698 DrawEdge
0x46d69c DispatchMessageA
0x46d6a0 DestroyWindow
0x46d6a4 DestroyMenu
0x46d6a8 DestroyIcon
0x46d6ac DestroyCursor
0x46d6b0 DeleteMenu
0x46d6b4 DefWindowProcA
0x46d6b8 DefMDIChildProcA
0x46d6bc DefFrameProcA
0x46d6c0 CreatePopupMenu
0x46d6c4 CreateMenu
0x46d6c8 CreateIcon
0x46d6cc ClientToScreen
0x46d6d0 CheckMenuItem
0x46d6d4 CallWindowProcA
0x46d6d8 CallNextHookEx
0x46d6dc BeginPaint
0x46d6e0 CharNextA
0x46d6e4 CharLowerBuffA
0x46d6e8 CharLowerA
0x46d6ec CharUpperBuffA
0x46d6f0 CharToOemA
0x46d6f4 AdjustWindowRectEx
Library kernel32.dll:
0x46d700 Sleep
Library oleaut32.dll:
0x46d708 SafeArrayPtrOfIndex
0x46d70c SafeArrayGetUBound
0x46d710 SafeArrayGetLBound
0x46d714 SafeArrayCreate
0x46d718 VariantChangeType
0x46d71c VariantCopy
0x46d720 VariantClear
0x46d724 VariantInit
Library ole32.dll:
0x46d72c CoTaskMemAlloc
0x46d730 CoCreateInstance
0x46d734 CoUninitialize
0x46d738 CoInitialize
Library comctl32.dll:
0x46d748 ImageList_Write
0x46d74c ImageList_Read
0x46d75c ImageList_DragMove
0x46d760 ImageList_DragLeave
0x46d764 ImageList_DragEnter
0x46d768 ImageList_EndDrag
0x46d76c ImageList_BeginDrag
0x46d770 ImageList_Remove
0x46d774 ImageList_DrawEx
0x46d778 ImageList_Draw
0x46d788 ImageList_Add
0x46d790 ImageList_Destroy
0x46d794 ImageList_Create
0x46d798 InitCommonControls

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49231 113.108.239.161 redirector.gvt1.com 80
192.168.56.101 49234 113.108.239.194 r1---sn-j5o7dn7e.gvt1.com 80
192.168.56.101 49236 113.108.239.196 r3---sn-j5o7dn7e.gvt1.com 80
192.168.56.101 49223 113.108.239.226 update.googleapis.com 443

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 53237 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 57756 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 51378 224.0.0.252 5355
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 58367 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58707 239.255.255.250 3702
192.168.56.101 62192 239.255.255.250 3702
192.168.56.101 65005 239.255.255.250 3702
192.168.56.101 65007 239.255.255.250 3702

HTTP & HTTPS Requests

URI Data
http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: redirector.gvt1.com

http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=77cea889002a6593&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619585295&mv=m
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&mvi=3&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=77cea889002a6593&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619585295&mv=m HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: r3---sn-j5o7dn7e.gvt1.com

http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619585537&mv=m&mvi=1&pl=23&shardbypass=yes
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1619585537&mv=m&mvi=1&pl=23&shardbypass=yes HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: r1---sn-j5o7dn7e.gvt1.com

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.