Archive Windows/Manifest_UFSFiles_Win64.txt @ Sperap(1.3.6).rar

Size 1.6MB
Type ASCII text, with CRLF line terminators
MD5 28d99c1697111705229ebfc67a571c36
SHA1 0a79f5388a76d1a46b5582cdb5605cfe3ee578d7
SHA256 c635fd1b8b838de243f38bcf6fc339b66e0e8274ea1d6c6ad49c914c65c831de
SHA512
d042c7980313d213614f9958e007d692a97f448eefa45ad1ee67492a93be6281b8794398f055b42a51c47305a5872697e75bf03723295c1ff70cf64d581fd8fa
CRC32 AB7D554D
ssdeep None
Yara None matched

Score

This archive shows some signs of potential malicious behavior.

The score of this archive is 1.1 out of 10.

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
ARCHIVE March 13, 2026, 10:01 a.m. March 13, 2026, 10:02 a.m. 60 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2026-03-13 09:01:18,108 [analyzer] DEBUG: Starting analyzer from: C:\tmpmdfut4
2026-03-13 09:01:18,108 [analyzer] DEBUG: Pipe server name: \??\PIPE\DejbRANJEbbBVtTsiHJyF
2026-03-13 09:01:18,108 [analyzer] DEBUG: Log pipe server name: \??\PIPE\IOYLdHhgpluDVNbIqUl
2026-03-13 09:01:18,108 [analyzer] DEBUG: No analysis package specified, trying to detect it automagically.
2026-03-13 09:01:18,108 [analyzer] INFO: Automatically selected analysis package "ie"
2026-03-13 09:01:18,390 [analyzer] DEBUG: Started auxiliary module Curtain
2026-03-13 09:01:18,390 [analyzer] DEBUG: Started auxiliary module DbgView
2026-03-13 09:01:18,812 [analyzer] DEBUG: Started auxiliary module Disguise
2026-03-13 09:01:19,000 [analyzer] DEBUG: Loaded monitor into process with pid 504
2026-03-13 09:01:19,000 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2026-03-13 09:01:19,000 [analyzer] DEBUG: Started auxiliary module Human
2026-03-13 09:01:19,000 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2026-03-13 09:01:19,000 [analyzer] DEBUG: Started auxiliary module Reboot
2026-03-13 09:01:19,046 [analyzer] DEBUG: Started auxiliary module RecentFiles
2026-03-13 09:01:19,046 [analyzer] DEBUG: Started auxiliary module Screenshots
2026-03-13 09:01:19,046 [analyzer] DEBUG: Started auxiliary module Sysmon
2026-03-13 09:01:19,046 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n
2026-03-13 09:01:19,062 [modules.packages.ie] INFO: Submitted file is missing extension, adding .html
2026-03-13 09:01:19,155 [lib.api.process] INFO: Successfully executed process from path 'C:\\Program Files\\Internet Explorer\\iexplore.exe' with arguments ['C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\Windows/Manifest_UFSFiles_Win64.txt.html'] and pid 1464
2026-03-13 09:01:19,312 [analyzer] DEBUG: Loaded monitor into process with pid 1464
2026-03-13 09:01:21,062 [analyzer] DEBUG: Following legitimate IE11 process: "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:275457 /prefetch:2!
2026-03-13 09:01:21,140 [analyzer] INFO: Injected into process with pid 2464 and name u'iexplore.exe'
2026-03-13 09:01:21,233 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 2464.
2026-03-13 09:01:21,375 [analyzer] INFO: Added new file to list with pid 1464 and path C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D0FE3F33-1EB2-11F1-9D7E-3020D62C6363}.dat
2026-03-13 09:01:21,405 [analyzer] DEBUG: Loaded monitor into process with pid 2464
2026-03-13 09:01:21,421 [analyzer] INFO: Added new file to list with pid 1464 and path C:\Users\Administrator\AppData\Local\Temp\~DFD8EF39884BAAEF23.TMP
2026-03-13 09:01:21,625 [analyzer] DEBUG: Error resolving function mshtml!CDocument_write through our custom callback.
2026-03-13 09:01:21,625 [analyzer] DEBUG: Error resolving function mshtml!CElement_put_innerHTML through our custom callback.
2026-03-13 09:01:21,625 [analyzer] DEBUG: Error resolving function mshtml!CHyperlink_SetUrlComponent through our custom callback.
2026-03-13 09:01:21,625 [analyzer] DEBUG: Error resolving function mshtml!CIFrameElement_CreateElement through our custom callback.
2026-03-13 09:01:21,625 [analyzer] DEBUG: Error resolving function mshtml!CImgElement_put_src through our custom callback.
2026-03-13 09:01:21,625 [analyzer] DEBUG: Error resolving function mshtml!CScriptElement_put_src through our custom callback.
2026-03-13 09:01:21,640 [analyzer] DEBUG: Error resolving function mshtml!CWindow_AddTimeoutCode through our custom callback.
2026-03-13 09:01:21,640 [analyzer] DEBUG: Error resolving function mshtml!CDocument_write through our custom callback.
2026-03-13 09:01:21,640 [analyzer] DEBUG: Error resolving function mshtml!CElement_put_innerHTML through our custom callback.
2026-03-13 09:01:21,640 [analyzer] DEBUG: Error resolving function mshtml!CHyperlink_SetUrlComponent through our custom callback.
2026-03-13 09:01:21,640 [analyzer] DEBUG: Error resolving function mshtml!CIFrameElement_CreateElement through our custom callback.
2026-03-13 09:01:21,640 [analyzer] DEBUG: Error resolving function mshtml!CImgElement_put_src through our custom callback.
2026-03-13 09:01:21,640 [analyzer] DEBUG: Error resolving function mshtml!CScriptElement_put_src through our custom callback.
2026-03-13 09:01:21,640 [analyzer] DEBUG: Error resolving function mshtml!CWindow_AddTimeoutCode through our custom callback.
2026-03-13 09:01:22,015 [analyzer] INFO: Added new file to list with pid 1464 and path C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{D0FE3F35-1EB2-11F1-9D7E-3020D62C6363}.dat
2026-03-13 09:01:22,030 [analyzer] INFO: Added new file to list with pid 1464 and path C:\Users\Administrator\AppData\Local\Temp\~DF51C02AC7375F92A9.TMP
2026-03-13 09:01:22,092 [analyzer] DEBUG: Error resolving function mshtml!CDocument_write through our custom callback.
2026-03-13 09:01:22,092 [analyzer] DEBUG: Error resolving function mshtml!CElement_put_innerHTML through our custom callback.
2026-03-13 09:01:22,092 [analyzer] DEBUG: Error resolving function mshtml!CHyperlink_SetUrlComponent through our custom callback.
2026-03-13 09:01:22,092 [analyzer] DEBUG: Error resolving function mshtml!CIFrameElement_CreateElement through our custom callback.
2026-03-13 09:01:22,092 [analyzer] DEBUG: Error resolving function mshtml!CImgElement_put_src through our custom callback.
2026-03-13 09:01:22,092 [analyzer] DEBUG: Error resolving function mshtml!CScriptElement_put_src through our custom callback.
2026-03-13 09:01:22,092 [analyzer] DEBUG: Error resolving function mshtml!CWindow_AddTimeoutCode through our custom callback.
2026-03-13 09:02:07,802 [analyzer] INFO: Analysis timeout hit, terminating analysis.
2026-03-13 09:02:08,036 [lib.api.process] ERROR: Failed to dump memory of 64-bit process with pid 1464.
2026-03-13 09:02:08,115 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 2464.
2026-03-13 09:02:08,349 [analyzer] INFO: Terminating remaining processes before shutdown.
2026-03-13 09:02:08,365 [lib.api.process] INFO: Successfully terminated process with pid 1464.
2026-03-13 09:02:08,365 [lib.api.process] INFO: Successfully terminated process with pid 2464.
2026-03-13 09:02:08,365 [analyzer] INFO: Error dumping file from path "c:\users\administrator\appdata\local\temp\~df51c02ac7375f92a9.tmp": [Errno 13] Permission denied: u'c:\\users\\administrator\\appdata\\local\\temp\\~df51c02ac7375f92a9.tmp'
2026-03-13 09:02:08,381 [analyzer] INFO: Error dumping file from path "c:\users\administrator\appdata\local\temp\~dfd8ef39884baaef23.tmp": [Errno 13] Permission denied: u'c:\\users\\administrator\\appdata\\local\\temp\\~dfd8ef39884baaef23.tmp'
2026-03-13 09:02:08,381 [analyzer] INFO: Analysis completed.

Cuckoo Log

2026-03-13 10:01:18,900 [cuckoo.core.scheduler] INFO: Task #7484551: acquired machine win7x644 (label=win7x644)
2026-03-13 10:01:18,900 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.204 for task #7484551
2026-03-13 10:01:19,207 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3468240 (interface=vboxnet0, host=192.168.168.204)
2026-03-13 10:01:19,232 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x644
2026-03-13 10:01:19,792 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x644 to vmcloak
2026-03-13 10:01:29,795 [cuckoo.core.guest] INFO: Starting analysis #7484551 on guest (id=win7x644, ip=192.168.168.204)
2026-03-13 10:01:30,804 [cuckoo.core.guest] DEBUG: win7x644: not ready yet
2026-03-13 10:01:35,829 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x644, ip=192.168.168.204)
2026-03-13 10:01:35,925 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x644, ip=192.168.168.204, monitor=latest, size=6660546)
2026-03-13 10:01:37,616 [cuckoo.core.resultserver] DEBUG: Task #7484551: live log analysis.log initialized.
2026-03-13 10:01:38,572 [cuckoo.core.resultserver] DEBUG: Task #7484551 is sending a BSON stream
2026-03-13 10:01:38,883 [cuckoo.core.resultserver] DEBUG: Task #7484551 is sending a BSON stream
2026-03-13 10:01:39,798 [cuckoo.core.resultserver] DEBUG: Task #7484551: File upload for 'shots/0001.jpg'
2026-03-13 10:01:39,816 [cuckoo.core.resultserver] DEBUG: Task #7484551 uploaded file length: 133489
2026-03-13 10:01:40,977 [cuckoo.core.resultserver] DEBUG: Task #7484551 is sending a BSON stream
2026-03-13 10:01:41,920 [cuckoo.core.resultserver] DEBUG: Task #7484551: File upload for 'shots/0002.jpg'
2026-03-13 10:01:41,924 [cuckoo.core.resultserver] DEBUG: Task #7484551 uploaded file length: 24529
2026-03-13 10:01:43,035 [cuckoo.core.resultserver] DEBUG: Task #7484551: File upload for 'shots/0003.jpg'
2026-03-13 10:01:43,063 [cuckoo.core.resultserver] DEBUG: Task #7484551 uploaded file length: 304540
2026-03-13 10:01:44,172 [cuckoo.core.resultserver] DEBUG: Task #7484551: File upload for 'shots/0004.jpg'
2026-03-13 10:01:44,204 [cuckoo.core.resultserver] DEBUG: Task #7484551 uploaded file length: 318037
2026-03-13 10:01:52,158 [cuckoo.core.guest] DEBUG: win7x644: analysis #7484551 still processing
2026-03-13 10:02:07,244 [cuckoo.core.guest] DEBUG: win7x644: analysis #7484551 still processing
2026-03-13 10:02:08,258 [cuckoo.core.resultserver] DEBUG: Task #7484551: File upload for 'curtain/1773388928.24.curtain.log'
2026-03-13 10:02:08,261 [cuckoo.core.resultserver] DEBUG: Task #7484551 uploaded file length: 36
2026-03-13 10:02:08,362 [cuckoo.core.resultserver] DEBUG: Task #7484551: File upload for 'sysmon/1773388928.35.sysmon.xml'
2026-03-13 10:02:08,367 [cuckoo.core.resultserver] DEBUG: Task #7484551 uploaded file length: 123584
2026-03-13 10:02:08,375 [cuckoo.core.resultserver] DEBUG: Task #7484551: File upload for 'files/91d82c20b63293e9_recoverystore.{d0fe3f33-1eb2-11f1-9d7e-3020d62c6363}.dat'
2026-03-13 10:02:08,378 [cuckoo.core.resultserver] DEBUG: Task #7484551 uploaded file length: 5632
2026-03-13 10:02:08,391 [cuckoo.core.resultserver] DEBUG: Task #7484551: File upload for 'files/424923f6e9079767_{d0fe3f35-1eb2-11f1-9d7e-3020d62c6363}.dat'
2026-03-13 10:02:08,393 [cuckoo.core.resultserver] DEBUG: Task #7484551 uploaded file length: 4608
2026-03-13 10:02:09,035 [cuckoo.core.resultserver] DEBUG: Task #7484551: File upload for 'shots/0005.jpg'
2026-03-13 10:02:09,051 [cuckoo.core.resultserver] DEBUG: Task #7484551 uploaded file length: 133489
2026-03-13 10:02:09,066 [cuckoo.core.resultserver] DEBUG: Task #7484551 had connection reset for <Context for LOG>
2026-03-13 10:02:10,258 [cuckoo.core.guest] INFO: win7x644: analysis completed successfully
2026-03-13 10:02:10,270 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2026-03-13 10:02:10,292 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2026-03-13 10:02:11,164 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x644 to path /srv/cuckoo/cwd/storage/analyses/7484551/memory.dmp
2026-03-13 10:02:11,165 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x644
2026-03-13 10:02:18,816 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.204 for task #7484551
2026-03-13 10:02:19,151 [cuckoo.core.scheduler] DEBUG: Released database task #7484551
2026-03-13 10:02:19,169 [cuckoo.core.scheduler] INFO: Task #7484551: analysis procedure completed

Signatures

Allocates read-write-execute memory (usually to unpack itself) (50 out of 236 events)
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff618000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff618000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff618000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feffa2f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feffa06000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feffa06000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feffa06000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefb96b000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef4524000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefd504000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefa7cc000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefa7e4000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefa72b000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef45d4000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefb1aa000
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1464
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000003240000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff29b000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff29b000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff29b000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff29b000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefd981000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef2032000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef417e000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefdbaf000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefdbd8000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ec6000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76641000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75cbc000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75cbc000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75cbc000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75cb7000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75cb7000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75cb7000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75471000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76a30000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76a30000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76a30000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x769a0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x766e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76041000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76b31000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76b31000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76b31000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76b31000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76b31000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76b31000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76b31000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76b31000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76b31000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76b31000
process_handle: 0xffffffff
1 0 0
Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) (1 event)
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2464
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x7ef70000
process_handle: 0xffffffff
1 0 0
Uses Windows utilities for basic Windows functionality (1 event)
cmdline "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:275457 /prefetch:2
Resumed a suspended thread in a remote process potentially indicative of process injection (2 events)
Process injection Process 1464 resumed a thread in remote process 2464
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000000000000034c
suspend_count: 1
process_identifier: 2464
1 0 0
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.