VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Ransomware
Dropper
Trojan
...
|
Threat Names: |
Generic.Ransom.Matrix.D7248D5E
Trojan.GenericKD.40672878
Generic.Ransom.Matrix.0D6A71DB
...
|
bwng.exe
Windows Exe (x86-32)
Created at 2020-01-21T14:54:00
Remarks (2/2)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "6 minutes" to "1 minute" to reveal dormant functionality.
(0x0200003A): A task was rescheduled ahead of time to reveal dormant functionality.
Kernel Graph 1

Code Block #1 (EP #1)
»
Information | Value |
---|---|
Trigger | IopLoadDriver+0xa04 |
Start Address | 0xfffff88004abd058 |
Execution Path #1 (length: 58, count: 1, processes: 1)
»
Information | Value |
---|---|
Sequence Length | 58 |
Processes
»
Process | Count |
---|---|
Process 28 (System, PID: 4) | 1 |
Sequence
»
Symbol | Parameters |
---|---|
RtlInitUnicodeString | SourceString = PsAcquireProcessExitSynchronization, DestinationString_out = PsAcquireProcessExitSynchronization |
MmGetSystemRoutineAddress | SystemRoutineName = PsAcquireProcessExitSynchronization, ret_val_ptr_out = 0xfffff80002c0dd90 |
RtlInitUnicodeString | SourceString = PsReleaseProcessExitSynchronization, DestinationString_out = PsReleaseProcessExitSynchronization |
MmGetSystemRoutineAddress | SystemRoutineName = PsReleaseProcessExitSynchronization, ret_val_ptr_out = 0xfffff80002c1c770 |
RtlInitUnicodeString | SourceString = ObGetObjectType, DestinationString_out = ObGetObjectType |
MmGetSystemRoutineAddress | SystemRoutineName = ObGetObjectType, ret_val_ptr_out = 0xfffff80002b46b54 |
ObGetObjectType | ret_val_out = 0xfffffa800184acd0 |
ExAllocatePoolWithTag | PoolType_unk = 0x1, NumberOfBytes_ptr = 0x26, Tag = 0x544f4550, ret_val_ptr_out = 0xfffff8a003dfb1b0 |
ObOpenObjectByName | ObjectAttributes_unk = 0xfffff88002f9d6a0, ObjectType_unk = 0xfffffa800184acd0, AccessMode_unk = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0xfffff880000f0001, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Handle_ptr_out = 0xfffff88002f9d6f8, Handle_out = 0xffffffff80000a78, ret_val_out = 0x0 |
ExFreePoolWithTag | P_ptr = 0xfffff8a003dfb1b0, Tag = 0x0 |
ObReferenceObjectByHandle | Handle_unk = 0xffffffff80000a78, DesiredAccess_unk = 0xf0001, ObjectType_unk = 0xfffffa800184acd0, AccessMode_unk = 0x0, Object_ptr_out = 0xfffff88002f9d700, Object_out = 0xfffffa80018be570, HandleInformation_unk_out = 0x0, ret_val_out = 0x0 |
ZwClose | Handle_unk = 0xffffffff80000a78, ret_val_out = 0x0 |
ObfDereferenceObject | Object_ptr = 0xfffffa80018be570, ret_val_ptr_out = 0x2 |
RtlInitUnicodeString | SourceString = \Device\PROCEXP152, DestinationString_out = \Device\PROCEXP152 |
RtlInitUnicodeString | SourceString = D:P(A;;GA;;;SY)(A;;GA;;;BA), DestinationString_out = D:P(A;;GA;;;SY)(A;;GA;;;BA) |
RtlInitUnicodeString | SourceString = IoCreateDeviceSecure, DestinationString_out = IoCreateDeviceSecure |
MmGetSystemRoutineAddress | SystemRoutineName = IoCreateDeviceSecure, ret_val_ptr_out = 0x0 |
RtlInitUnicodeString | SourceString = IoValidateDeviceIoControlAccess, DestinationString_out = IoValidateDeviceIoControlAccess |
MmGetSystemRoutineAddress | SystemRoutineName = IoValidateDeviceIoControlAccess, ret_val_ptr_out = 0xfffff8000292a4c0 |
ExAllocatePoolWithTag | PoolType_unk = 0x1, NumberOfBytes_ptr = 0x68, Tag = 0x6c416553, ret_val_ptr_out = 0xfffff8a002bce480 |
_wcsnicmp | _String1 = A, _String2 = A, _MaxCount_ptr = 0x1, ret_val_out = 0 |
_wcsnicmp | _String1 = GA, _String2 = RC, _MaxCount_ptr = 0x2, ret_val_out = -11 |
_wcsnicmp | _String1 = GA, _String2 = WD, _MaxCount_ptr = 0x2, ret_val_out = -16 |
_wcsnicmp | _String1 = GA, _String2 = WO, _MaxCount_ptr = 0x2, ret_val_out = -16 |
_wcsnicmp | _String1 = GA, _String2 = SD, _MaxCount_ptr = 0x2, ret_val_out = -12 |
_wcsnicmp | _String1 = GA, _String2 = GA, _MaxCount_ptr = 0x2, ret_val_out = 0 |
_wcsnicmp | _String1 = SY, _String2 = WD, _MaxCount_ptr = 0x2, ret_val_out = -4 |
_wcsnicmp | _String1 = SY, _String2 = BA, _MaxCount_ptr = 0x2, ret_val_out = 17 |
_wcsnicmp | _String1 = SY, _String2 = SY, _MaxCount_ptr = 0x2, ret_val_out = 0 |
RtlLengthSid | Sid_ptr = 0xfffffa800184a8a0, Sid_deref_Revision = 0x1, Sid_deref_SubAuthorityCount = 0x1, Sid_deref_IdentifierAuthority.Value_[0]_0 = 0x0, Sid_deref_IdentifierAuthority.Value_[1]_1 = 0x0, Sid_deref_IdentifierAuthority.Value_[2]_2 = 0x0, Sid_deref_IdentifierAuthority.Value_[3]_3 = 0x0, Sid_deref_IdentifierAuthority.Value_[4]_4 = 0x0, Sid_deref_IdentifierAuthority.Value_[5]_5 = 0x5, Sid_deref_SubAuthority = 0x12, ret_val_out = 0xc |
RtlAddAccessAllowedAce | Acl_unk = 0xfffff8a002bce480, AceRevision = 0x2, AccessMask_unk = 0x10000000, Sid_ptr = 0xfffffa800184a8a0, Sid_deref_Revision = 0x1, Sid_deref_SubAuthorityCount = 0x1, Sid_deref_IdentifierAuthority.Value_[0]_0 = 0x0, Sid_deref_IdentifierAuthority.Value_[1]_1 = 0x0, Sid_deref_IdentifierAuthority.Value_[2]_2 = 0x0, Sid_deref_IdentifierAuthority.Value_[3]_3 = 0x0, Sid_deref_IdentifierAuthority.Value_[4]_4 = 0x0, Sid_deref_IdentifierAuthority.Value_[5]_5 = 0x5, Sid_deref_SubAuthority = 0x12, Acl_unk_out = 0xfffff8a002bce480, ret_val_out = 0x0 |
_wcsnicmp | _String1 = A, _String2 = A, _MaxCount_ptr = 0x1, ret_val_out = 0 |
_wcsnicmp | _String1 = GA, _String2 = RC, _MaxCount_ptr = 0x2, ret_val_out = -11 |
_wcsnicmp | _String1 = GA, _String2 = WD, _MaxCount_ptr = 0x2, ret_val_out = -16 |
_wcsnicmp | _String1 = GA, _String2 = WO, _MaxCount_ptr = 0x2, ret_val_out = -16 |
_wcsnicmp | _String1 = GA, _String2 = SD, _MaxCount_ptr = 0x2, ret_val_out = -12 |
_wcsnicmp | _String1 = GA, _String2 = GA, _MaxCount_ptr = 0x2, ret_val_out = 0 |
_wcsnicmp | _String1 = BA, _String2 = WD, _MaxCount_ptr = 0x2, ret_val_out = -21 |
_wcsnicmp | _String1 = BA, _String2 = BA, _MaxCount_ptr = 0x2, ret_val_out = 0 |
RtlLengthSid | Sid_ptr = 0xfffff8a000001840, Sid_deref_Revision = 0x1, Sid_deref_SubAuthorityCount = 0x2, Sid_deref_IdentifierAuthority.Value_[0]_0 = 0x0, Sid_deref_IdentifierAuthority.Value_[1]_1 = 0x0, Sid_deref_IdentifierAuthority.Value_[2]_2 = 0x0, Sid_deref_IdentifierAuthority.Value_[3]_3 = 0x0, Sid_deref_IdentifierAuthority.Value_[4]_4 = 0x0, Sid_deref_IdentifierAuthority.Value_[5]_5 = 0x5, Sid_deref_SubAuthority_[0]_0 = 0x20, Sid_deref_SubAuthority_[1]_1 = 0x0, ret_val_out = 0x10 |
RtlAddAccessAllowedAce | Acl_unk = 0xfffff8a002bce480, AceRevision = 0x2, AccessMask_unk = 0x10000000, Sid_ptr = 0xfffff8a000001840, Sid_deref_Revision = 0x1, Sid_deref_SubAuthorityCount = 0x2, Sid_deref_IdentifierAuthority.Value_[0]_0 = 0x0, Sid_deref_IdentifierAuthority.Value_[1]_1 = 0x0, Sid_deref_IdentifierAuthority.Value_[2]_2 = 0x0, Sid_deref_IdentifierAuthority.Value_[3]_3 = 0x0, Sid_deref_IdentifierAuthority.Value_[4]_4 = 0x0, Sid_deref_IdentifierAuthority.Value_[5]_5 = 0x5, Sid_deref_SubAuthority_[0]_0 = 0x20, Sid_deref_SubAuthority_[1]_1 = 0x0, Acl_unk_out = 0xfffff8a002bce480, ret_val_out = 0x0 |
RtlCreateSecurityDescriptor | Revision = 0x1, SecurityDescriptor_unk_out = 0xfffff88002f9d588, ret_val_out = 0x0 |
RtlSetDaclSecurityDescriptor | SecurityDescriptor_unk = 0xfffff88002f9d588, DaclPresent = 1, Dacl_unk = 0xfffff8a002bce480, DaclDefaulted = 0, SecurityDescriptor_unk_out = 0xfffff88002f9d588, ret_val_out = 0x0 |
RtlAbsoluteToSelfRelativeSD | AbsoluteSecurityDescriptor_unk = 0xfffff88002f9d588, BufferLength_ptr = 0xfffff88002f9d5d0, SelfRelativeSecurityDescriptor_unk_out = 0x0, BufferLength_ptr_out = 0xfffff88002f9d5d0, ret_val_out = 0xc0000023 |
ExAllocatePoolWithTag | PoolType_unk = 0x1, NumberOfBytes_ptr = 0x48, Tag = 0x64536553, ret_val_ptr_out = 0xfffff8a001d9c610 |
RtlAbsoluteToSelfRelativeSD | AbsoluteSecurityDescriptor_unk = 0xfffff88002f9d588, BufferLength_ptr = 0xfffff88002f9d5d0, SelfRelativeSecurityDescriptor_unk_out = 0xfffff8a001d9c610, BufferLength_ptr_out = 0xfffff88002f9d5d0, ret_val_out = 0x0 |
ExFreePoolWithTag | P_ptr = 0xfffff8a002bce480, Tag = 0x0 |
IoCreateDevice | DriverObject_unk = 0xfffffa8003b25a50, DeviceExtensionSize = 0x0, DeviceName = \Device\PROCEXP152, DeviceType_unk = 0x8335, DeviceCharacteristics = 0x0, Exclusive = 0, DeviceObject_unk_out = 0xfffff88002f9d6d0, ret_val_out = 0x0 |
RtlGetOwnerSecurityDescriptor | SecurityDescriptor_unk = 0xfffff8a001d9c610, Owner_ptr_out = 0xfffff88002f9d560, Owner_out = 0x0, OwnerDefaulted_ptr_out = 0xfffff88002f9d598, ret_val_out = 0x0 |
RtlGetGroupSecurityDescriptor | SecurityDescriptor_unk = 0xfffff8a001d9c610, Group_ptr_out = 0xfffff88002f9d560, Group_out = 0x0, GroupDefaulted_ptr_out = 0xfffff88002f9d598, ret_val_out = 0x0 |
RtlGetSaclSecurityDescriptor | SecurityDescriptor_unk = 0xfffff8a001d9c610, SaclPresent_ptr_out = 0xfffff88002f9d5a8, Sacl_unk_out = 0xfffff88002f9d568, SaclDefaulted_ptr_out = 0xfffff88002f9d598, ret_val_out = 0x0 |
RtlGetDaclSecurityDescriptor | SecurityDescriptor_unk = 0xfffff8a001d9c610, DaclPresent_ptr_out = 0xfffff88002f9d5a8, Dacl_unk_out = 0xfffff88002f9d568, DaclDefaulted_ptr_out = 0xfffff88002f9d598, ret_val_out = 0x0 |
ObOpenObjectByPointer | Object_ptr = 0xfffffa80038b5900, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x40000, ObjectType_unk = 0xfffffa8001933900, AccessMode_unk = 0xfffffa8003b25a00, Handle_ptr_out = 0xfffff88002f9d5d0, Handle_out = 0xffffffff80000a78, ret_val_out = 0x0 |
ZwSetSecurityObject | Handle_unk = 0xffffffff80000a78, SecurityInformation_unk = 0x4, SecurityDescriptor_unk = 0xfffff8a001d9c610, ret_val_out = 0x0 |
ZwClose | Handle_unk = 0xffffffff80000a78, ret_val_out = 0x0 |
ExFreePoolWithTag | P_ptr = 0xfffff8a001d9c610, Tag = 0x0 |
RtlInitUnicodeString | SourceString = \DosDevices\PROCEXP152, DestinationString_out = \DosDevices\PROCEXP152 |
IoCreateSymbolicLink | SymbolicLinkName = \DosDevices\PROCEXP152, DeviceName = \Device\PROCEXP152, ret_val_out = 0x0 |
Kernel Graph 2

Code Block #2 (EP #2, #3, #4, #5, #6, #7, #8, #9, #10, #11, #12, #13, #23)
»
Information | Value |
---|---|
Trigger | IofCallDriver+0x50 |
Start Address | 0xfffff88004ab6000 |
Execution Path #2 (length: 5, count: 8, processes: 8)
»
Information | Value |
---|---|
Sequence Length | 5 |
Processes
»
Process | Count |
---|---|
Process 23 (bv6nck8c64.exe, PID: 2928) | 1 |
Process 148 (bv6nck8c64.exe, PID: 3220) | 1 |
Process 162 (bv6nck8c64.exe, PID: 3356) | 1 |
Process 187 (bv6nck8c64.exe, PID: 3644) | 1 |
Process 205 (bv6nck8c64.exe, PID: 3844) | 1 |
Process 218 (bv6nck8c64.exe, PID: 3976) | 1 |
Process 235 (bv6nck8c64.exe, PID: 3100) | 1 |
Process 244 (bv6nck8c64.exe, PID: 3160) | 1 |
Sequence
»
Symbol | Parameters |
---|---|
SeCaptureSubjectContext | SubjectContext_unk_out = 0xfffff880054f8598 |
ExGetPreviousMode | ret_val_unk_out = 0xfffffa80036a0b01 |
SePrivilegeCheck | RequiredPrivileges_unk = 0xfffff880054f85b8, SubjectSecurityContext_unk = 0xfffff880054f8598, AccessMode_unk = 0x1, RequiredPrivileges_unk_out = 0xfffff880054f85b8, ret_val_out = 1 |
SeReleaseSubjectContext | SubjectContext_unk = 0xfffff880054f8598, SubjectContext_unk_out = 0xfffff880054f8598 |
IofCompleteRequest | Irp_unk = 0xfffffa800d08d010, PriorityBoost = 0 |
Execution Path #3 (length: 10, count: 9141, processes: 8)
»
Information | Value |
---|---|
Sequence Length | 10 |
Processes
»
Process | Count |
---|---|
Process 23 (bv6nck8c64.exe, PID: 2928) | 1325 |
Process 148 (bv6nck8c64.exe, PID: 3220) | 101 |
Process 162 (bv6nck8c64.exe, PID: 3356) | 1325 |
Process 187 (bv6nck8c64.exe, PID: 3644) | 1255 |
Process 205 (bv6nck8c64.exe, PID: 3844) | 1266 |
Process 218 (bv6nck8c64.exe, PID: 3976) | 1304 |
Process 235 (bv6nck8c64.exe, PID: 3100) | 1247 |
Process 244 (bv6nck8c64.exe, PID: 3160) | 1318 |
Sequence
»
Symbol | Parameters |
---|---|
PsLookupProcessByProcessId | ProcessId_unk = 0x6c8, Process_unk_out = 0xfffff880054f8558, ret_val_out = 0x0 |
PsAcquireProcessExitSynchronization | ret_val_out = 0x0 |
KeStackAttachProcess | PROCESS_unk = 0xfffffa800387fb30, PROCESS_unk_out = 0xfffffa800387fb30, ApcState_unk_out = 0xfffff880054f85d0 |
ObReferenceObjectByHandle | Handle_unk = 0x80, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffffa800378d401, Object_ptr_out = 0xfffff880054f8548, Object_out = 0xfffffa80038366d0, HandleInformation_unk_out = 0x0, ret_val_out = 0x0 |
KeUnstackDetachProcess | ApcState_unk = 0xfffff880054f85d0 |
PsReleaseProcessExitSynchronization | ret_val_out = 0x2 |
ObfDereferenceObject | Object_ptr = 0xfffffa800387fb30, ret_val_ptr_out = 0xe |
ObQueryNameString | Object_ptr = 0xfffffa8003168830, Length = 0x800, ObjectNameInfo_unk_out = 0xfffffa80038c27c4, ReturnLength_ptr_out = 0xfffff880054f8508, ret_val_out = 0x0 |
ObfDereferenceObject | Object_ptr = 0xfffffa80038366d0, ret_val_ptr_out = 0x3 |
IofCompleteRequest | Irp_unk = 0xfffffa800d08d010, PriorityBoost = 0 |
Execution Path #4 (length: 13, count: 32, processes: 8)
»
Information | Value |
---|---|
Sequence Length | 13 |
Processes
»
Process | Count |
---|---|
Process 23 (bv6nck8c64.exe, PID: 2928) | 4 |
Process 148 (bv6nck8c64.exe, PID: 3220) | 4 |
Process 162 (bv6nck8c64.exe, PID: 3356) | 4 |
Process 187 (bv6nck8c64.exe, PID: 3644) | 4 |
Process 205 (bv6nck8c64.exe, PID: 3844) | 4 |
Process 218 (bv6nck8c64.exe, PID: 3976) | 4 |
Process 235 (bv6nck8c64.exe, PID: 3100) | 4 |
Process 244 (bv6nck8c64.exe, PID: 3160) | 4 |
Sequence
»
Symbol | Parameters |
---|---|
PsLookupProcessByProcessId | ProcessId_unk = 0x88c, Process_unk_out = 0xfffff880054f85a8, ret_val_out = 0x0 |
PsAcquireProcessExitSynchronization | ret_val_out = 0x0 |
KeStackAttachProcess | PROCESS_unk = 0xfffffa80037bcb30, PROCESS_unk_out = 0xfffffa80037bcb30, ApcState_unk_out = 0xfffff880054f85c8 |
ObReferenceObjectByHandle | Handle_unk = 0x48, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffffa800378d401, Object_ptr_out = 0xfffff880054f85b0, Object_out = 0xfffffa8003881b30, HandleInformation_unk_out = 0x0, ret_val_out = 0x0 |
PsReleaseProcessExitSynchronization | ret_val_out = 0x2 |
ObfDereferenceObject | Object_ptr = 0xfffffa80037bcb30, ret_val_ptr_out = 0xe |
ZwQueryObject | Handle_unk = 0x48, ObjectInformationClass_unk = 0x2, ObjectInformationLength = 0x0, ObjectInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xfffff880054f85a4, ret_val_out = 0xc0000004 |
ExAllocatePoolWithTag | PoolType_unk = 0x1, NumberOfBytes_ptr = 0x88, Tag = 0x58637250, ret_val_ptr_out = 0xfffff8a0025628c0 |
ZwQueryObject | Handle_unk = 0x48, ObjectInformationClass_unk = 0x2, ObjectInformationLength = 0x88, ObjectInformation_ptr_out = 0xfffff8a0025628c0, ReturnLength_ptr_out = 0x0, ret_val_out = 0x0 |
ExFreePoolWithTag | P_ptr = 0xfffff8a0025628c0, Tag = 0x0 |
ObfDereferenceObject | Object_ptr = 0xfffffa8003881b30, ret_val_ptr_out = 0x1 |
KeUnstackDetachProcess | ApcState_unk = 0xfffff880054f85c8 |
IofCompleteRequest | Irp_unk = 0xfffffa800d08d010, PriorityBoost = 0 |
Execution Path #5 (length: 2, count: 16, processes: 8)
»
Information | Value |
---|---|
Sequence Length | 2 |
Processes
»
Process | Count |
---|---|
Process 23 (bv6nck8c64.exe, PID: 2928) | 2 |
Process 148 (bv6nck8c64.exe, PID: 3220) | 2 |
Process 162 (bv6nck8c64.exe, PID: 3356) | 2 |
Process 187 (bv6nck8c64.exe, PID: 3644) | 2 |
Process 205 (bv6nck8c64.exe, PID: 3844) | 2 |
Process 218 (bv6nck8c64.exe, PID: 3976) | 2 |
Process 235 (bv6nck8c64.exe, PID: 3100) | 2 |
Process 244 (bv6nck8c64.exe, PID: 3160) | 2 |
Sequence
»
Symbol | Parameters |
---|---|
ZwOpenProcess | DesiredAccess_unk = 0x10000000, ObjectAttributes_ptr = 0xfffff880054f8688, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x0, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xfffff880054f8678, ClientId_deref_UniqueProcess_unk = 0x4, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xfffffa8002007ac0, ProcessHandle_out = 0xc0, ret_val_out = 0x0 |
IofCompleteRequest | Irp_unk = 0xfffffa800eb5b010, PriorityBoost = 0 |
Execution Path #6 (length: 4, count: 16, processes: 8)
»
Information | Value |
---|---|
Sequence Length | 4 |
Processes
»
Process | Count |
---|---|
Process 23 (bv6nck8c64.exe, PID: 2928) | 2 |
Process 148 (bv6nck8c64.exe, PID: 3220) | 2 |
Process 162 (bv6nck8c64.exe, PID: 3356) | 2 |
Process 187 (bv6nck8c64.exe, PID: 3644) | 2 |
Process 205 (bv6nck8c64.exe, PID: 3844) | 2 |
Process 218 (bv6nck8c64.exe, PID: 3976) | 2 |
Process 235 (bv6nck8c64.exe, PID: 3100) | 2 |
Process 244 (bv6nck8c64.exe, PID: 3160) | 2 |
Sequence
»
Symbol | Parameters |
---|---|
ZwOpenProcess | DesiredAccess_unk = 0x40, ObjectAttributes_ptr = 0xfffff880054f8608, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x200, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xfffff880054f85f8, ClientId_deref_UniqueProcess_unk = 0x4, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xfffff880054f85f0, ProcessHandle_out = 0xffffffff80000954, ret_val_out = 0x0 |
ZwDuplicateObject | SourceProcessHandle_unk = 0xffffffff80000954, SourceHandle_unk = 0x424, TargetProcessHandle_unk = 0xffffffffffffffff, DesiredAccess_unk = 0xfffff88010000000, HandleAttributes = 0x0, Options = 0x0, TargetHandle_ptr_out = 0xfffffa8002007ac0, TargetHandle_out = 0xc8, ret_val_out = 0x0 |
ZwClose | Handle_unk = 0xffffffff80000954, ret_val_out = 0x0 |
IofCompleteRequest | Irp_unk = 0xfffffa800eb5b010, PriorityBoost = 0 |
Execution Path #7 (length: 8, count: 64, processes: 7)
»
Information | Value |
---|---|
Sequence Length | 8 |
Processes
»
Process | Count |
---|---|
Process 23 (bv6nck8c64.exe, PID: 2928) | 10 |
Process 162 (bv6nck8c64.exe, PID: 3356) | 38 |
Process 187 (bv6nck8c64.exe, PID: 3644) | 1 |
Process 205 (bv6nck8c64.exe, PID: 3844) | 6 |
Process 218 (bv6nck8c64.exe, PID: 3976) | 7 |
Process 235 (bv6nck8c64.exe, PID: 3100) | 1 |
Process 244 (bv6nck8c64.exe, PID: 3160) | 1 |
Sequence
»
Symbol | Parameters |
---|---|
PsLookupProcessByProcessId | ProcessId_unk = 0x4, Process_unk_out = 0xfffff880054f8558, ret_val_out = 0x0 |
PsAcquireProcessExitSynchronization | ret_val_out = 0x0 |
KeStackAttachProcess | PROCESS_unk = 0xfffffa8001850990, PROCESS_unk_out = 0xfffffa8001850990, ApcState_unk_out = 0xfffff880054f85d0 |
ObReferenceObjectByHandle | Handle_unk = 0xffffffff80000908, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffffa800378d400, Object_ptr_out = 0xfffff880054f8548, Object_out = 0x0, HandleInformation_unk_out = 0x0, ret_val_out = 0xc0000008 |
KeUnstackDetachProcess | ApcState_unk = 0xfffff880054f85d0 |
PsReleaseProcessExitSynchronization | ret_val_out = 0x2 |
ObfDereferenceObject | Object_ptr = 0xfffffa8001850990, ret_val_ptr_out = 0x105 |
IofCompleteRequest | Irp_unk = 0xfffffa800eb5b010, PriorityBoost = 0 |
Execution Path #8 (length: 6, count: 754, processes: 8)
»
Information | Value |
---|---|
Sequence Length | 6 |
Processes
»
Process | Count |
---|---|
Process 23 (bv6nck8c64.exe, PID: 2928) | 108 |
Process 148 (bv6nck8c64.exe, PID: 3220) | 22 |
Process 162 (bv6nck8c64.exe, PID: 3356) | 110 |
Process 187 (bv6nck8c64.exe, PID: 3644) | 106 |
Process 205 (bv6nck8c64.exe, PID: 3844) | 102 |
Process 218 (bv6nck8c64.exe, PID: 3976) | 102 |
Process 235 (bv6nck8c64.exe, PID: 3100) | 101 |
Process 244 (bv6nck8c64.exe, PID: 3160) | 103 |
Sequence
»
Symbol | Parameters |
---|---|
ObReferenceObjectByHandle | Handle_unk = 0xc0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0x1, Object_ptr_out = 0xfffff880054f8668, Object_out = 0xfffffa8002b79b30, HandleInformation_unk_out = 0x0, ret_val_out = 0x0 |
ObOpenObjectByPointer | Object_ptr = 0xfffffa8002b79b30, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x10000000, ObjectType_unk = 0x0, AccessMode_unk = 0x0, Handle_ptr_out = 0xfffff880054f8670, Handle_out = 0xffffffff80000954, ret_val_out = 0x0 |
ObfDereferenceObject | Object_ptr = 0xfffffa8002b79b30, ret_val_ptr_out = 0x18 |
ZwOpenProcessToken | ProcessHandle_unk = 0xffffffff80000954, DesiredAccess_unk = 0x8, TokenHandle_ptr_out = 0xfffffa800289c440, TokenHandle_out = 0xc8, ret_val_out = 0x0 |
ZwClose | Handle_unk = 0xffffffff80000954, ret_val_out = 0x0 |
IofCompleteRequest | Irp_unk = 0xfffffa800eb5b010, PriorityBoost = 0 |
Execution Path #9 (length: 9, count: 19, processes: 6)
»
Information | Value |
---|---|
Sequence Length | 9 |
Processes
»
Process | Count |
---|---|
Process 23 (bv6nck8c64.exe, PID: 2928) | 7 |
Process 162 (bv6nck8c64.exe, PID: 3356) | 5 |
Process 187 (bv6nck8c64.exe, PID: 3644) | 1 |
Process 205 (bv6nck8c64.exe, PID: 3844) | 3 |
Process 235 (bv6nck8c64.exe, PID: 3100) | 1 |
Process 244 (bv6nck8c64.exe, PID: 3160) | 2 |
Sequence
»
Symbol | Parameters |
---|---|
PsLookupProcessByProcessId | ProcessId_unk = 0x328, Process_unk_out = 0xfffff880054f8558, ret_val_out = 0x0 |
PsAcquireProcessExitSynchronization | ret_val_out = 0x0 |
KeStackAttachProcess | PROCESS_unk = 0xfffffa8001fdf060, PROCESS_unk_out = 0xfffffa8001fdf060, ApcState_unk_out = 0xfffff880054f85d0 |
ObReferenceObjectByHandle | Handle_unk = 0x168, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffffa800378d401, Object_ptr_out = 0xfffff880054f8548, Object_out = 0xfffffa80038654a0, HandleInformation_unk_out = 0x0, ret_val_out = 0x0 |
ObfDereferenceObject | Object_ptr = 0xfffffa80038654a0, ret_val_ptr_out = 0x3 |
KeUnstackDetachProcess | ApcState_unk = 0xfffff880054f85d0 |
PsReleaseProcessExitSynchronization | ret_val_out = 0x2 |
ObfDereferenceObject | Object_ptr = 0xfffffa8001fdf060, ret_val_ptr_out = 0x39 |
IofCompleteRequest | Irp_unk = 0xfffffa800fcdd790, PriorityBoost = 0 |
Execution Path #10 (length: 2, count: 47, processes: 4)
»
Information | Value |
---|---|
Sequence Length | 2 |
Processes
»
Process | Count |
---|---|
Process 23 (bv6nck8c64.exe, PID: 2928) | 14 |
Process 162 (bv6nck8c64.exe, PID: 3356) | 11 |
Process 187 (bv6nck8c64.exe, PID: 3644) | 10 |
Process 205 (bv6nck8c64.exe, PID: 3844) | 12 |
Sequence
»
Symbol | Parameters |
---|---|
PsLookupProcessByProcessId | ProcessId_unk = 0xadc, Process_unk_out = 0xfffff880054f8558, ret_val_out = 0xc000000b |
IofCompleteRequest | Irp_unk = 0xfffffa800fcdd790, PriorityBoost = 0 |
Execution Path #11 (length: 1, count: 45, processes: 8)
»
Information | Value |
---|---|
Sequence Length | 1 |
Processes
»
Process | Count |
---|---|
Process 23 (bv6nck8c64.exe, PID: 2928) | 1 |
Process 148 (bv6nck8c64.exe, PID: 3220) | 1 |
Process 162 (bv6nck8c64.exe, PID: 3356) | 1 |
Process 187 (bv6nck8c64.exe, PID: 3644) | 1 |
Process 205 (bv6nck8c64.exe, PID: 3844) | 1 |
Process 218 (bv6nck8c64.exe, PID: 3976) | 1 |
Process 235 (bv6nck8c64.exe, PID: 3100) | 38 |
Process 244 (bv6nck8c64.exe, PID: 3160) | 1 |
Sequence
»
Symbol | Parameters |
---|---|
IofCompleteRequest | Irp_unk = 0xfffffa800fcdd790, PriorityBoost = 0 |
Execution Path #12 (length: 8, count: 1, processes: 1)
»
Information | Value |
---|---|
Sequence Length | 8 |
Processes
»
Process | Count |
---|---|
Process 148 (bv6nck8c64.exe, PID: 3220) | 1 |
Sequence
»
Symbol | Parameters |
---|---|
PsLookupProcessByProcessId | ProcessId_unk = 0x720, Process_unk_out = 0xfffff880054525f0, ret_val_out = 0x0 |
KeStackAttachProcess | PROCESS_unk = 0xfffffa8002251300, PROCESS_unk_out = 0xfffffa8002251300, ApcState_unk_out = 0xfffff88005452608 |
ObReferenceObjectByHandle | Handle_unk = 0x14c, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffffa800394e601, Object_ptr_out = 0xfffff880054525f8, Object_out = 0xfffff8a0019ff7c0, HandleInformation_unk_out = 0xfffff88005452600, ret_val_out = 0x0 |
ObCloseHandle | Handle_unk = 0x14c, AccessMode_unk = 0x1, ret_val_out = 0x0 |
ObfDereferenceObject | Object_ptr = 0xfffff8a0019ff7c0, ret_val_ptr_out = 0x0 |
KeUnstackDetachProcess | ApcState_unk = 0xfffff88005452608 |
ObfDereferenceObject | Object_ptr = 0xfffffa8002251300, ret_val_ptr_out = 0x4a |
IofCompleteRequest | Irp_unk = 0xfffffa80019d8780, PriorityBoost = 0 |
Execution Path #13 (length: 9, count: 1, processes: 1)
»
Information | Value |
---|---|
Sequence Length | 9 |
Processes
»
Process | Count |
---|---|
Process 205 (bv6nck8c64.exe, PID: 3844) | 1 |
Sequence
»
Symbol | Parameters |
---|---|
PsLookupProcessByProcessId | ProcessId_unk = 0x4, Process_unk_out = 0xfffff88005590558, ret_val_out = 0x0 |
KeStackAttachProcess | PROCESS_unk = 0xfffffa8001850990, PROCESS_unk_out = 0xfffffa8001850990, ApcState_unk_out = 0xfffff880055905d0 |
ObReferenceObjectByHandle | Handle_unk = 0xffffffff80000b00, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffffa80038d3700, Object_ptr_out = 0xfffff88005590548, Object_out = 0xfffffa80036033c0, HandleInformation_unk_out = 0x0, ret_val_out = 0x0 |
KeUnstackDetachProcess | ApcState_unk = 0xfffff880055905d0 |
PsReleaseProcessExitSynchronization | ret_val_out = 0x2 |
ObfDereferenceObject | Object_ptr = 0xfffffa8001850990, ret_val_ptr_out = 0x14a |
ObQueryNameString | Object_ptr = 0xfffffa80036033c0, Length = 0x800, ObjectNameInfo_unk_out = 0xfffffa800254c044, ReturnLength_ptr_out = 0xfffff88005590550, ret_val_out = 0x0 |
ObfDereferenceObject | Object_ptr = 0xfffffa80036033c0, ret_val_ptr_out = 0x2 |
IofCompleteRequest | Irp_unk = 0xfffffa800211c1b0, PriorityBoost = 0 |
Execution Path #23 (length: 9, count: 1, processes: 1)
»
Information | Value |
---|---|
Sequence Length | 9 |
Processes
»
Process | Count |
---|---|
Process 235 (bv6nck8c64.exe, PID: 3100) | 1 |
Sequence
»
Symbol | Parameters |
---|---|
PsLookupProcessByProcessId | ProcessId_unk = 0x2c8, Process_unk_out = 0xfffff88005000558, ret_val_out = 0x0 |
PsAcquireProcessExitSynchronization | ret_val_out = 0x0 |
KeStackAttachProcess | PROCESS_unk = 0xfffffa80030fdb30, PROCESS_unk_out = 0xfffffa80030fdb30, ApcState_unk_out = 0xfffff880050005d0 |
ObReferenceObjectByHandle | Handle_unk = 0x258, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffffa80039a2001, Object_ptr_out = 0xfffff88005000548, Object_out = 0xfffffa8002f2c220, HandleInformation_unk_out = 0x0, ret_val_out = 0x0 |
KeUnstackDetachProcess | ApcState_unk = 0xfffff880050005d0 |
PsReleaseProcessExitSynchronization | ret_val_out = 0x2 |
ObfDereferenceObject | Object_ptr = 0xfffffa80030fdb30, ret_val_ptr_out = 0xff |
ObQueryNameString | Object_ptr = 0xfffffa800282fcd0, Length = 0x800, ObjectNameInfo_unk_out = 0xfffffa800231d7c4, ReturnLength_ptr_out = 0xfffff88005000508, ret_val_out = 0x0 |
ObfDereferenceObject | Object_ptr = 0xfffffa8002f2c220, ret_val_ptr_out = 0x12 |
Kernel Graph 3

Code Block #3 (EP #24)
»
Information | Value |
---|---|
Trigger | ExpWorkerThread+0x10f |
Start Address | 0xfffffa80019f8378 |
Execution Path #24 (length: 1, count: 1, processes: 1 incomplete)
»
Information | Value |
---|---|
Sequence Length | 1 |
Processes
»
Process | Count |
---|---|
Process 28 (System, PID: 4) | 1 |
Sequence
»
Symbol | Parameters |
---|---|
ExAllocatePoolWithTag | PoolType_unk = 0x0, NumberOfBytes_ptr = 0x1d054, Tag = 0x655a6343, ret_val_ptr_out = 0xfffffa8003a2a000 |
Kernel Graph 4

Code Block #4 (EP #14)
»
Information | Value |
---|---|
Trigger | PROCEXP152.SYS+0x2641 |
Start Address | 0xfffff80002c0dd90 |
Execution Path #14 (length: 1, count: 37, processes: 1)
»
Information | Value |
---|---|
Sequence Length | 1 |
Processes
»
Process | Count |
---|---|
Process 235 (bv6nck8c64.exe, PID: 3100) | 37 |
Sequence
»
Symbol | Parameters |
---|---|
PsAcquireProcessExitSynchronization | ret_val_out = 0x0 |
Kernel Graph 5

Code Block #5 (EP #15)
»
Information | Value |
---|---|
Trigger | PROCEXP152.SYS+0x2669 |
Start Address | 0xfffff800028c7410 |
Execution Path #15 (length: 1, count: 37, processes: 1)
»
Information | Value |
---|---|
Sequence Length | 1 |
Processes
»
Process | Count |
---|---|
Process 235 (bv6nck8c64.exe, PID: 3100) | 37 |
Sequence
»
Symbol | Parameters |
---|---|
KeStackAttachProcess | PROCESS_unk = 0xfffffa8003055910, PROCESS_unk_out = 0xfffffa8003055910, ApcState_unk_out = 0xfffff880050005d0 |
Kernel Graph 6

Code Block #6 (EP #16)
»
Information | Value |
---|---|
Trigger | PROCEXP152.SYS+0x26a0 |
Start Address | 0xfffff80002b708e0 |
Execution Path #16 (length: 1, count: 37, processes: 3)
»
Information | Value |
---|---|
Sequence Length | 1 |
Processes
»
Process | Count |
---|---|
Process 35 (lsass.exe, PID: 480) | 3 |
Process 46 (explorer.exe, PID: 1092) | 33 |
Process 94 (skype.exe, PID: 2496) | 1 |
Sequence
»
Symbol | Parameters |
---|---|
ObReferenceObjectByHandle | Handle_unk = 0x738, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffffa80039a2001, Object_ptr_out = 0xfffff88005000548, Object_out = 0xfffffa800352e5a0, HandleInformation_unk_out = 0x0, ret_val_out = 0x0 |
Kernel Graph 7

Code Block #7 (EP #17)
»
Information | Value |
---|---|
Trigger | PROCEXP152.SYS+0x26d2 |
Start Address | 0xfffff800028c7120 |
Execution Path #17 (length: 1, count: 37, processes: 3)
»
Information | Value |
---|---|
Sequence Length | 1 |
Processes
»
Process | Count |
---|---|
Process 35 (lsass.exe, PID: 480) | 3 |
Process 46 (explorer.exe, PID: 1092) | 33 |
Process 94 (skype.exe, PID: 2496) | 1 |
Sequence
»
Symbol | Parameters |
---|---|
KeUnstackDetachProcess | ApcState_unk = 0xfffff880050005d0 |
Kernel Graph 8

Code Block #8 (EP #18)
»
Information | Value |
---|---|
Trigger | PROCEXP152.SYS+0x26ee |
Start Address | 0xfffff80002c1c770 |
Execution Path #18 (length: 1, count: 37, processes: 1)
»
Information | Value |
---|---|
Sequence Length | 1 |
Processes
»
Process | Count |
---|---|
Process 235 (bv6nck8c64.exe, PID: 3100) | 37 |
Sequence
»
Symbol | Parameters |
---|---|
PsReleaseProcessExitSynchronization | ret_val_out = 0x2 |
Kernel Graph 9

Code Block #9 (EP #19)
»
Information | Value |
---|---|
Trigger | PROCEXP152.SYS+0x26f5 |
Start Address | 0xfffff800028a0440 |
Execution Path #19 (length: 1, count: 74, processes: 1)
»
Information | Value |
---|---|
Sequence Length | 1 |
Processes
»
Process | Count |
---|---|
Process 235 (bv6nck8c64.exe, PID: 3100) | 74 |
Sequence
»
Symbol | Parameters |
---|---|
ObfDereferenceObject | Object_ptr = 0xfffffa8003055910, ret_val_ptr_out = 0xd9 |
Kernel Graph 10

Code Block #10 (EP #20)
»
Information | Value |
---|---|
Trigger | PROCEXP152.SYS+0x27c8 |
Start Address | 0xfffff80002b75e80 |
Execution Path #20 (length: 1, count: 37, processes: 1)
»
Information | Value |
---|---|
Sequence Length | 1 |
Processes
»
Process | Count |
---|---|
Process 235 (bv6nck8c64.exe, PID: 3100) | 37 |
Sequence
»
Symbol | Parameters |
---|---|
ObQueryNameString | Object_ptr = 0xfffffa800352e5a0, Length = 0x800, ObjectNameInfo_unk_out = 0xfffffa8001a08044, ReturnLength_ptr_out = 0xfffff88005000550, ret_val_out = 0x0 |
Kernel Graph 11

Code Block #11 (EP #21, #22)
»
Information | Value |
---|---|
Trigger | PROCEXP152.SYS+0x211a |
Start Address | 0xfffff80002bb0f97 |
Execution Path #21 (length: 9, count: 34, processes: 1)
»
Information | Value |
---|---|
Sequence Length | 9 |
Processes
»
Process | Count |
---|---|
Process 235 (bv6nck8c64.exe, PID: 3100) | 34 |
Sequence
»
Symbol | Parameters |
---|---|
PsAcquireProcessExitSynchronization | ret_val_out = 0x0 |
KeStackAttachProcess | PROCESS_unk = 0xfffffa8003055910, PROCESS_unk_out = 0xfffffa8003055910, ApcState_unk_out = 0xfffff880050005d0 |
ObReferenceObjectByHandle | Handle_unk = 0x74c, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffffa80039a2001, Object_ptr_out = 0xfffff88005000548, Object_out = 0xfffffa80023916f0, HandleInformation_unk_out = 0x0, ret_val_out = 0x0 |
KeUnstackDetachProcess | ApcState_unk = 0xfffff880050005d0 |
PsReleaseProcessExitSynchronization | ret_val_out = 0x2 |
ObfDereferenceObject | Object_ptr = 0xfffffa8003055910, ret_val_ptr_out = 0xd9 |
ObQueryNameString | Object_ptr = 0xfffffa80023916f0, Length = 0x800, ObjectNameInfo_unk_out = 0xfffffa8001a02044, ReturnLength_ptr_out = 0xfffff88005000550, ret_val_out = 0x0 |
ObfDereferenceObject | Object_ptr = 0xfffffa80023916f0, ret_val_ptr_out = 0x2 |
IofCompleteRequest | Irp_unk = 0xfffffa800c9fb010, PriorityBoost = 0 |
Execution Path #22 (length: 5, count: 3, processes: 1)
»
Information | Value |
---|---|
Sequence Length | 5 |
Processes
»
Process | Count |
---|---|
Process 235 (bv6nck8c64.exe, PID: 3100) | 3 |
Sequence
»
Symbol | Parameters |
---|---|
ObOpenObjectByPointer | Object_ptr = 0xfffffa8003058b30, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x10000000, ObjectType_unk = 0x0, AccessMode_unk = 0x0, Handle_ptr_out = 0xfffff88005000670, Handle_out = 0xffffffff800006d4, ret_val_out = 0x0 |
ObfDereferenceObject | Object_ptr = 0xfffffa8003058b30, ret_val_ptr_out = 0x3f |
ZwOpenProcessToken | ProcessHandle_unk = 0xffffffff800006d4, DesiredAccess_unk = 0x8, TokenHandle_ptr_out = 0xfffffa800289e880, TokenHandle_out = 0xc8, ret_val_out = 0x0 |
ZwClose | Handle_unk = 0xffffffff800006d4, ret_val_out = 0x0 |
IofCompleteRequest | Irp_unk = 0xfffffa800c9fb010, PriorityBoost = 0 |