| 是不是同一个东西换壳,每次hmpa的拦截点都一样 Mitigation   HeapHeapProtectTimestamp    2025-07-11T02:24:29
 
 Platform     10.0.22631/x64 v2019 06_a5%
 PID          10400
 Feature      00FD2F70000001A2
 Application  C:\Users\Lenovo\Downloads\20250711银狐1x\bii.968128004.exe
 Created      2025-07-11T02:11:35
 Description  OutlookAttachView 3.54
 
 Callee Type  ProtectVirtualMemory
 0x0000000000950000 (39429 bytes)
 
 Shellcode (HHP) (0x00009A05 bytes : start at 0000000000950000)
 Target address info: (anonymous)
 Owner of CALLER: (anonymous; allocated by 0000000140002A55, bii.968128004.exe)
 
 OwnerModule
 Name         bii.968128004.exe
 Path         C:\Users\Lenovo\Downloads\20250711银狐1x\bii.968128004.exe
 Thumbprint   f7aa8048650d5a83c724db5dfeb169c9d96466414c20508242b00d960cb37231
 SHA-256      8867ee0ebd2420479d88f9a39b3a3188f6ec7997e52244b38442d33d34848d57
 SHA-1        d35b6035587327c14fde989a41ad6101895fa028
 MD5          1c1d949667f8defee6608a6b814d0307
 
 Current process is not signed
 OwnerModule is not signed
 
 00000000007BB7B5  ff9424a0000000           CALL         QWORD [RSP+0xa0]
 00000000007BB7BC  85c0                     TEST         EAX, EAX
 00000000007BB7BE  753c                     JNZ          0x7bb7fc
 00000000007BB7C0  c744243000000000         MOV          DWORD [RSP+0x30], 0x0
 00000000007BB7C8  eb0a                     JMP          0x7bb7d4
 00000000007BB7CA  8b442430                 MOV          EAX, [RSP+0x30]
 00000000007BB7CE  ffc0                     INC          EAX
 00000000007BB7D0  89442430                 MOV          [RSP+0x30], EAX
 00000000007BB7D4  837c243064               CMP          DWORD [RSP+0x30], 0x64
 00000000007BB7D9  7d1f                     JGE          0x7bb7fa
 00000000007BB7DB  4863442430               MOVSXD       RAX, DWORD [RSP+0x30]
 00000000007BB7E0  41b800800000             MOV          R8D, 0x8000
 00000000007BB7E6  33d2                     XOR          EDX, EDX
 00000000007BB7E8  488b8cc4b0000000         MOV          RCX, [RSP+RAX*8+0xb0]
 
 ----- SNIP HERE -----
 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
 ----- END SNIP -----
 
 Stack Trace
 #  Address          Module                   Location
 -- ---------------- ------------------------ ----------------------------------------
 1  00007FFB4A847376 KernelBase.dll           VirtualProtect +0x36
 
 2  00000000007BB7BC (anonymous; bii.968128004.exe)
 85c0                     TEST         EAX, EAX
 753c                     JNZ          0x7bb7fc
 c744243000000000         MOV          DWORD [RSP+0x30], 0x0
 eb0a                     JMP          0x7bb7d4
 
 3  0000000000009A05 (unknown)
 
 Loaded Modules (29)
 -----------------------------------------------------------------------------
 0000000140000000-0000000144FCC000 bii.968128004.exe (NirSoft),
 version: 3.54
 00007FFB4D0D0000-00007FFB4D2E7000 ntdll.dll (Microsoft Corporation),
 version: 10.0.22621.5624 (WinBuild.160101.0800)
 00007FFAF4B50000-00007FFAF4C89000 hmpalert.dll (Sophos B.V.),
 version: 3.20.2.2019
 00007FFB4BCC0000-00007FFB4BD84000 KERNEL32.dll (Microsoft Corporation),
 version: 10.0.22621.5415 (WinBuild.160101.0800)
 00007FFB4A7E0000-00007FFB4ABB2000 KERNELBASE.dll (Microsoft Corporation),
 version: 10.0.22621.5547 (WinBuild.160101.0800)
 00007FFB0B170000-00007FFB0B24B000 bdhkm64.dll (BitDefender S.R.L. Bucha),
 version: 1.11.236.0 #0x3d65324
 00007FFB00350000-00007FFB00519000 atcuf64.dll (Bitdefender S.R.L. Bucha),
 version: 1.75.422.0 #0x1fcf7d72c
 00007FFB44BD0000-00007FFB44C67000 apphelp.dll (Microsoft Corporation),
 version: 10.0.22621.5547 (WinBuild.160101.0800)
 00007FFB4B820000-00007FFB4B9D1000 USER32.dll (Microsoft Corporation),
 version: 10.0.22621.5415 (WinBuild.160101.0800)
 00007FFB4ABC0000-00007FFB4ABE6000 win32u.dll (Microsoft Corporation),
 version: 10.0.22621.5624 (WinBuild.160101.0800)
 00007FFB4CEA0000-00007FFB4CEC9000 GDI32.dll (Microsoft Corporation),
 version: 10.0.22621.5185 (WinBuild.160101.0800)
 00007FFB4A360000-00007FFB4A483000 gdi32full.dll (Microsoft Corporation),
 version: 10.0.22621.5624 (WinBuild.160101.0800)
 00007FFB4A1C0000-00007FFB4A25A000 msvcp_win.dll (Microsoft Corporation),
 version: 10.0.22621.3374 (WinBuild.160101.0800)
 00007FFB4A550000-00007FFB4A661000 ucrtbase.dll (Microsoft Corporation),
 version: 10.0.22621.3593 (WinBuild.160101.0800)
 00007FFB4B290000-00007FFB4B395000 comdlg32.dll (Microsoft Corporation),
 version: 10.0.22621.5547 (WinBuild.160101.0800)
 00007FFB4BE70000-00007FFB4C203000 combase.dll (Microsoft Corporation),
 version: 10.0.22621.5624 (WinBuild.160101.0800)
 00007FFB4B0B0000-00007FFB4B1C4000 RPCRT4.dll (Microsoft Corporation),
 version: 10.0.22621.5413 (WinBuild.160101.0800)
 00007FFB4C2F0000-00007FFB4C3FC000 shcore.dll (Microsoft Corporation),
 version: 10.0.22621.5547 (WinBuild.160101.0800)
 00007FFB4BD90000-00007FFB4BDF9000 SHLWAPI.dll (Microsoft Corporation),
 version: 10.0.22621.5547 (WinBuild.160101.0800)
 00007FFB4BB50000-00007FFB4BBF7000 msvcrt.dll (Microsoft Corporation),
 version: 7.0.22621.2506 (WinBuild.160101.0800)
 00007FFB4C5F0000-00007FFB4CE92000 SHELL32.dll (Microsoft Corporation),
 version: 10.0.22621.5547 (WinBuild.160101.0800)
 00007FFB4A670000-00007FFB4A7AF000 wintypes.dll (Microsoft Corporation),
 version: 10.0.22621.5262 (WinBuild.160101.0800)
 00007FFB4CF30000-00007FFB4CFE1000 ADVAPI32.dll (Microsoft Corporation),
 version: 10.0.22621.5624 (WinBuild.160101.0800)
 00007FFB4BC00000-00007FFB4BCA8000 sechost.dll (Microsoft Corporation),
 version: 10.0.22621.5415 (WinBuild.160101.0800)
 00007FFB4A7B0000-00007FFB4A7D8000 bcrypt.dll (Microsoft Corporation),
 version: 10.0.22621.4746 (WinBuild.160101.0800)
 00007FFB4AD60000-00007FFB4AF00000 ole32.dll (Microsoft Corporation),
 version: 10.0.22621.5415 (WinBuild.160101.0800)
 00007FFB2D750000-00007FFB2D9EB000 COMCTL32.dll (Microsoft Corporation),
 version: 6.10 (WinBuild.160101.0800)
 00007FFB464C0000-00007FFB464CA000 VERSION.dll (Microsoft Corporation),
 version: 10.0.22621.1 (WinBuild.160101.0800)
 00007FFB4AFE0000-00007FFB4B011000 IMM32.DLL (Microsoft Corporation),
 version: 10.0.22621.5185 (WinBuild.160101.0800)
 
 Process Trace
 1  C:\Users\Lenovo\Downloads\20250711银狐1x\bii.968128004.exe [10400]
 2  C:\Users\Lenovo\Downloads\20250711银狐1x\bii.968128004.exe [17776]
 3  C:\Windows\explorer.exe [9960]
 
 Dropped Files
 
 Thumbprints
 f7aa8048650d5a83c724db5dfeb169c9d96466414c20508242b00d960cb37231 (hhp-ownermodule)
 c2d5f1fda2fdf09727d88cb17448f06e6c577a38f4c963e54d0ef73bd932ac6a (hhp-fhsh-ownmod)
 8bd6282297e86da22e2023115e4b77d8ccd59e6f5a76cc67ea2423253cf946bb (hhp-pfn)
 7b68d3fd63389518efe063254713a11fadabde10073cad12842e7662c41a85e5 (code)
 |