Summary | ZeroBOX

مدمج الفصل الأول+الثاني+ الثالث +الرابع + المصادر+الملاحق .exe

Anti_VM PE64 PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6402 June 24, 2021, 8:51 a.m. June 24, 2021, 8:53 a.m.
Size 3.9MB
Type MS-DOS executable, MZ for MS-DOS
MD5 11fdd27279a2a41a93b3ef63dd1ff548
SHA256 392d82e299dd3c9297a13cee34bbb04248f6e63a3d551ef47ef1346387c66447
CRC32 9699101C
ssdeep 98304:n8qbrrz2PI4SyqBMvP5oEWdTdT/Z9wbvboefUE3biLJ1G6ZC:Z/zKwBMvBobZx9mvcMUEuLzRZ
Yara
  • PE_Header_Zero - PE File Signature
  • anti_vm_detect - Possibly employs anti-virtualization techniques
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
172.217.25.14 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
file C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe\PATH
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
resource name RT_DATA
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
0xb90004
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30

exception.instruction_r: ff 15 16 1f 09 00 ff 25 00 00 00 00 aa a4 e4 76
exception.instruction: call qword ptr [rip + 0x91f16]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0xb90004
registers.r14: 406056088
registers.r15: 346059728
registers.rcx: 1420
registers.rsi: 17302540
registers.r10: 0
registers.rbx: 406055344
registers.rsp: 406055064
registers.r11: 406058960
registers.r8: 1999536524
registers.r9: 0
registers.rdx: 1432
registers.r12: 406055704
registers.rbp: 406055200
registers.rdi: 73383216
registers.rax: 12124160
registers.r13: 346194912
1 0 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 4564
region_size: 4087808
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ed0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 5192
region_size: 290816
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00460000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 5192
region_size: 24576
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003f0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 8780
region_size: 20480
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000030d0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 8780
region_size: 221184
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000003100000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 8780
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000735bc000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4716
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000735bc000
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 4716
region_size: 20480
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000005280000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 4716
region_size: 221184
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000005290000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1848
region_size: 20480
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000004200000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1848
region_size: 221184
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000004860000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1848
region_size: 24576
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000004210000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1848
region_size: 53248
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000042c0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0
Application Crash Process chrome.exe with pid 8780 crashed
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
0xb90004
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30
0x30

exception.instruction_r: ff 15 16 1f 09 00 ff 25 00 00 00 00 aa a4 e4 76
exception.instruction: call qword ptr [rip + 0x91f16]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0xb90004
registers.r14: 406056088
registers.r15: 346059728
registers.rcx: 1420
registers.rsi: 17302540
registers.r10: 0
registers.rbx: 406055344
registers.rsp: 406055064
registers.r11: 406058960
registers.r8: 1999536524
registers.r9: 0
registers.rdx: 1432
registers.r12: 406055704
registers.rbp: 406055200
registers.rdi: 73383216
registers.rax: 12124160
registers.r13: 346194912
1 0 0
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\reports\9a38d9bc-d582-4012-af43-2d941ff6a654.dmp
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\index
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics-spare.pma
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-spare.pma
file C:\Users\test22\AppData\Local\Google\Chrome\User Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-active.pma
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-60D3DBC9-224C.pma
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\First Run
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\reports
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\metadata
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_0
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_2
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_3
file C:\Users\test22\AppData\Local\Temp\~543.tmp.pdf
file C:\Users\test22\AppData\Roaming\chknvany\clippugc.exe
file C:\Windows\System32\iscssync.exe
Time & API Arguments Status Return Repeated

CreateServiceW

service_start_name:
start_type: 2
password:
display_name: iscssync
filepath: C:\Windows\System32\iscssync.exe -s
service_name: iscssync
filepath_r: C:\Windows\system32\iscssync.exe -s
desired_access: 983551
service_handle: 0x008c7e10
error_control: 1
service_type: 16
service_manager_handle: 0x008c7e38
1 9207312 0
section {u'size_of_data': u'0x003db800', u'virtual_address': u'0x00004000', u'entropy': 7.997901505850569, u'name': u'.rsrc', u'virtual_size': u'0x003db780'} entropy 7.99790150585 description A section with a high entropy has been found
entropy 0.998988366211 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

Process32NextW

snapshot_handle: 0x0000000000000fb0
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000000fb0
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000000fb0
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002408
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002408
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002408
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002fc0
process_name: pw.exe
process_identifier: 1036
0 0

Process32NextW

snapshot_handle: 0x0000000000002fc0
process_name: pw.exe
process_identifier: 1036
0 0

Process32NextW

snapshot_handle: 0x0000000000002fc0
process_name: pw.exe
process_identifier: 1036
0 0

Process32NextW

snapshot_handle: 0x0000000000002fc0
process_name: pw.exe
process_identifier: 1036
0 0

Process32NextW

snapshot_handle: 0x0000000000002fc0
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002fc0
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002fc0
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002fc0
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002fc0
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002fc0
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002fc0
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002fc0
process_name: pw.exe
process_identifier: 3968
0 0

Process32NextW

snapshot_handle: 0x0000000000002fc0
process_name: pw.exe
process_identifier: 3968
0 0

Process32NextW

snapshot_handle: 0x0000000000002154
process_name: pw.exe
process_identifier: 3968
0 0

Process32NextW

snapshot_handle: 0x0000000000002154
process_name: pw.exe
process_identifier: 3968
0 0

Process32NextW

snapshot_handle: 0x0000000000002154
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002154
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002154
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002154
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002154
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002154
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002154
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002154
process_name: pw.exe
process_identifier: 4900
0 0

Process32NextW

snapshot_handle: 0x0000000000002154
process_name: pw.exe
process_identifier: 4900
0 0

Process32NextW

snapshot_handle: 0x0000000000001c1c
process_name: pw.exe
process_identifier: 4900
0 0

Process32NextW

snapshot_handle: 0x0000000000001c1c
process_name: pw.exe
process_identifier: 4900
0 0

Process32NextW

snapshot_handle: 0x0000000000001c1c
process_name: pw.exe
process_identifier: 4900
0 0

Process32NextW

snapshot_handle: 0x0000000000001c1c
process_name: pw.exe
process_identifier: 4900
0 0

Process32NextW

snapshot_handle: 0x0000000000001c1c
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000001c1c
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002e40
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000001e9c
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000002fac
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000001eac
process_name: chrome.exe
process_identifier: 4716
0 0

Process32NextW

snapshot_handle: 0x0000000000001eac
process_name: inject-x64.exe
process_identifier: 448
0 0

Process32NextW

snapshot_handle: 0x0000000000001eac
process_name: inject-x64.exe
process_identifier: 1388
0 0

Process32NextW

snapshot_handle: 0x0000000000001eac
process_name: inject-x64.exe
process_identifier: 3536
0 0

Process32NextW

snapshot_handle: 0x0000000000001eac
process_name: inject-x64.exe
process_identifier: 6164
0 0

Process32NextW

snapshot_handle: 0x0000000000001eac
process_name: inject-x64.exe
process_identifier: 6164
0 0

Process32NextW

snapshot_handle: 0x0000000000001eac
process_name: inject-x64.exe
process_identifier: 8908
0 0

Process32NextW

snapshot_handle: 0x0000000000001eac
process_name: inject-x64.exe
process_identifier: 6104
0 0

Process32NextW

snapshot_handle: 0x0000000000001eac
process_name: inject-x64.exe
process_identifier: 6104
0 0

Process32NextW

snapshot_handle: 0x0000000000002ec8
process_name: inject-x64.exe
process_identifier: 4428
0 0

Process32NextW

snapshot_handle: 0x0000000000002ec8
process_name: inject-x64.exe
process_identifier: 2316
0 0
Time & API Arguments Status Return Repeated

NtTerminateProcess

status_code: 0xc0000005
process_identifier: 8780
process_handle: 0x00000000000000bc
0 0

NtTerminateProcess

status_code: 0xc0000005
process_identifier: 8780
process_handle: 0x00000000000000bc
1 0 0
buffer Buffer with sha1: e1df2f980db5d532aad43df961eacad78164a726
buffer Buffer with sha1: 52631157456210a1edf4f3983c99565e76220570
buffer Buffer with sha1: f0c9f3b3877d92f177cb353e7eb03cb9bc0b1308
buffer Buffer with sha1: 3ff4d0b3974f02094df88bef27185a92996adcda
host 172.217.25.14
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1848
region_size: 315392
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000003bd0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000064
1 0 0

NtAllocateVirtualMemory

process_identifier: 8780
region_size: 311296
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000003000000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000064
1 0 0

NtAllocateVirtualMemory

process_identifier: 4716
region_size: 311296
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000004730000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000064
1 0 0

NtAllocateVirtualMemory

process_identifier: 8496
region_size: 311296
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000890000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000064
1 0 0
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\iscstugc reg_value C:\Users\test22\AppData\Roaming\chknvany\clippugc.exe
service_name iscssync service_path C:\Windows\System32\iscssync.exe -s
file C:\Users\test22\AppData\Roaming\chknvany\clippugc.exe
file C:\Users\test22\AppData\Roaming\chknvany\clippugc.exe
file C:\Users\test22\AppData\Local\Temp\~543.tmp.pdf
file C:\Users\test22\AppData\Local\Temp\~64D.tmp
Process injection Process 5656 created a remote thread in non-child process 1848
Process injection Process 6472 created a remote thread in non-child process 8780
Process injection Process 4368 created a remote thread in non-child process 4716
Process injection Process 3004 created a remote thread in non-child process 8496
Time & API Arguments Status Return Repeated

CreateRemoteThread

thread_identifier: 0
process_identifier: 1848
function_address: 0x0000000003bd1fa0
flags: 0
stack_size: 0
parameter: 0x0000000003bd0000
process_handle: 0x0000000000000064
1 104 0

CreateRemoteThread

thread_identifier: 0
process_identifier: 8780
function_address: 0x0000000003001dd4
flags: 0
stack_size: 0
parameter: 0x0000000003000000
process_handle: 0x0000000000000064
1 104 0

CreateRemoteThread

thread_identifier: 0
process_identifier: 4716
function_address: 0x0000000004731dd4
flags: 0
stack_size: 0
parameter: 0x0000000004730000
process_handle: 0x0000000000000064
1 104 0

CreateRemoteThread

thread_identifier: 0
process_identifier: 8496
function_address: 0x0000000000891dd4
flags: 0
stack_size: 0
parameter: 0x0000000000890000
process_handle: 0x0000000000000064
1 104 0
Process injection Process 5656 manipulating memory of non-child process 1848
Process injection Process 6472 manipulating memory of non-child process 8780
Process injection Process 4368 manipulating memory of non-child process 4716
Process injection Process 3004 manipulating memory of non-child process 8496
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1848
region_size: 315392
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000003bd0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000064
1 0 0

NtAllocateVirtualMemory

process_identifier: 8780
region_size: 311296
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000003000000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000064
1 0 0

NtAllocateVirtualMemory

process_identifier: 4716
region_size: 311296
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000004730000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000064
1 0 0

NtAllocateVirtualMemory

process_identifier: 8496
region_size: 311296
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000890000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000064
1 0 0
parent_process chrome.exe martian_process "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xb0,0xb4,0xb8,0x84,0xbc,0x7fef2ca6e00,0x7fef2ca6e10,0x7fef2ca6e20
parent_process chrome.exe martian_process "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1104,14994988696023494514,8950486766080497416,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1136 /prefetch:2
Process injection Process 4716 resumed a thread in remote process 8780
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0

NtResumeThread

thread_handle: 0x0000000000000170
suspend_count: 2
process_identifier: 8780
1 0 0
Bkav W32.AIDetect.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Win32.Doboc.Gen.2
FireEye Generic.mg.11fdd27279a2a41a
CAT-QuickHeal W32.Tempedreve.A5
ALYac Win32.Doboc.Gen.2
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
K7AntiVirus Virus ( 005223721 )
Alibaba Virus:Win32/PolyRansom.da146613
K7GW Virus ( 005223721 )
Cybereason malicious.279a2a
Baidu Win32.Trojan.Kryptik.ii
Cyren W32/Ursnif.GWUR-0581
Symantec W32.Tempedreve.A!inf
ESET-NOD32 a variant of Win32/Kryptik.CTYE
APEX Malicious
Avast Win32:Crypt-SWP [Trj]
ClamAV Win.Trojan.Agent-1376290
Kaspersky Virus.Win32.PolyRansom.l
BitDefender Win32.Doboc.Gen.2
NANO-Antivirus Trojan.Win32.Kryptik.dmvgtq
Paloalto generic.ml
Rising Trojan.Kryptik!1.A6F7 (CLASSIC)
Ad-Aware Win32.Doboc.Gen.2
Sophos Mal/Generic-R + W32/MPhage-A
Comodo Worm.Win32.Tempedreve.DA@5jb9qs
DrWeb Win32.Tempedreve.1
VIPRE Worm.Win32.Tempedreve.a (v)
TrendMicro PE_URSNIF.B
McAfee-GW-Edition BehavesLike.Win32.Generic.wc
Emsisoft Win32.Doboc.Gen.2 (B)
Ikarus Trojan.Win32.Crypt
Jiangmin Trojan/Generic.bggax
Avira TR/Dropper.Gen
MAX malware (ai score=86)
Antiy-AVL Trojan/Generic.ASBOL.C5F5
Microsoft Virus:Win32/Ursnif.gen!A
Gridinsoft Trojan.Win32.Injector.ad!i
Arcabit Win32.Doboc.Gen.2
AegisLab Virus.Win32.PolyRansom.mE18
ZoneAlarm Virus.Win32.PolyRansom.l
GData Win32.Doboc.Gen.2
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win32.Agent.C3025472
Acronis suspicious
McAfee W32/PdfCrypt.b
VBA32 TrojanDropper.Daws
Malwarebytes PolyRansom.Virus.FileInfector.DDS
TrendMicro-HouseCall PE_URSNIF.B