What is CVE-2017-8464.exe?

CVE-2017-8464.exe is usually located in the 'c:\downloads\' folder.

Some of the anti-virus scanners at VirusTotal detected CVE-2017-8464.exe.

If you have additional information about the file, please share it with the FreeFixer users by posting a comment at the bottom of this page.

Vendor and version information [?]

CVE-2017-8464.exe does not have any version or vendor information.

Digital signatures [?]

CVE-2017-8464.exe is not signed.

VirusTotal report

50 of the 72 anti-virus programs at VirusTotal detected the CVE-2017-8464.exe file. That's a 69% detection rate.

ScannerDetection Name
Acronis suspicious
AegisLab Hacktool.Win32.CVE-2017-8464.3!c
AhnLab-V3 Trojan/Win32.CVE-2017-8464.C3119731
Alibaba Exploit:Win32/CplLnk.5e711112
Antiy-AVL Trojan[Exploit]/LNK.CVE-2010-2568
APEX Malicious
Arcabit Exploit.CVE-2010-2568.Gen
Avast LNK:Runner
AVG LNK:Runner
Avira EXP/CVE-2010-2568.B
BitDefender Exploit.CVE-2010-2568.Gen
CAT-QuickHeal PIF.StucksNet.A
Comodo Malware@#2s3qw85db3fuv
CrowdStrike win/malicious_confidence_90% (W)
Cybereason malicious.5ec4d0
Cylance Unsafe
Cyren CVE-2010-2568
DrWeb Exploit.Cpllnk
Emsisoft Exploit.CVE-2010-2568.Gen (B)
Endgame malicious (moderate confidence)
ESET-NOD32 LNK/Exploit.CVE-2010-2568
F-Secure Exploit.EXP/CVE-2010-2568.B
FireEye Generic.mg.8ddeb455ec4d03fa
Fortinet W32/PossibleThreat
GData Gen:Variant.Razy.477902
Ikarus Exploit.CVE-2010-2568
Invincea heuristic
K7AntiVirus Trojan ( 004c44ae1 )
K7GW Trojan ( 004c44ae1 )
Kaspersky HEUR:Exploit.Win32.CVE-2017-8464.gen
MAX malware (ai score=100)
MaxSecure Trojan.Malware.11732842.susgen
McAfee Artemis!8DDEB455EC4D
McAfee-GW-Edition BehavesLike.Win32.Backdoor.tc
Microsoft Exploit:Win32/CplLnk.B
MicroWorld-eScan Exploit.CVE-2010-2568.Gen
NANO-Antivirus Exploit.Lnk.Linker.bdepf
Paloalto generic.ml
Panda Trj/CI.A
Qihoo-360 Win32/Trojan.Exploit.fe9
Rising Exploit.CVE-2017-8464!1.AB8F (CLASSIC)
Sophos Mal/Generic-S
Symantec Trojan.Gen.MBT
Tencent Win32.Exploit.Cve-2017-8464.Eflm
Trapmine malicious.high.ml.score
TrendMicro EXPL_CPLNK.SM
TrendMicro-HouseCall EXPL_CPLNK.SM
VBA32 Exploit.CVE-2017-8464
Yandex Trojan.PowerShell!
ZoneAlarm HEUR:Exploit.Win32.CVE-2017-8464.gen
50 of the 72 anti-virus programs detected the CVE-2017-8464.exe file.

Sandbox Report

The following information was gathered by executing the file inside Cuckoo Sandbox.

Summary

Successfully executed process in sandbox.

Summary

{
    "file_created": [
        "C:\\cve\\X86_C.lnk",
        "C:\\cve\\X86_H.lnk",
        "C:\\cve\\X86_G.lnk",
        "C:\\cve\\L.lnk",
        "C:\\cve\\X86_R.lnk",
        "C:\\cve\\X86_P.lnk",
        "C:\\cve\\H.lnk",
        "C:\\cve\\A.lnk",
        "C:\\cve\\M.lnk",
        "C:\\cve\\V.lnk",
        "C:\\cve\\X86_X.lnk",
        "C:\\cve\\R.lnk",
        "C:\\cve\\X86_Y.lnk",
        "C:\\cve\\Q.lnk",
        "C:\\cve\\B.lnk",
        "C:\\cve\\X86_E.lnk",
        "C:\\cve\\E.lnk",
        "C:\\cve\\X86_D.lnk",
        "C:\\cve\\X86_O.lnk",
        "C:\\cve\\X86_N.lnk",
        "C:\\cve\\J.lnk",
        "C:\\cve\\X86_T.lnk",
        "C:\\cve\\X64.dll",
        "C:\\cve\\P.lnk",
        "C:\\cve\\X86_U.lnk",
        "C:\\cve\\K.lnk",
        "C:\\cve\\W.lnk",
        "C:\\cve\\X86_F.lnk",
        "C:\\cve\\Z.lnk",
        "C:\\cve\\X86_J.lnk",
        "C:\\cve\\F.lnk",
        "C:\\cve\\Y.lnk",
        "C:\\cve\\__tmp_rar_sfx_access_check_9697140",
        "C:\\cve\\X86_I.lnk",
        "C:\\cve\\X86_V.lnk",
        "C:\\cve\\X86_M.lnk",
        "C:\\cve\\C.lnk",
        "C:\\cve\\X86_S.lnk",
        "C:\\cve\\X86_Z.lnk",
        "C:\\cve\\X86_W.lnk",
        "C:\\cve\\I.lnk",
        "C:\\cve\\X86_B.lnk",
        "C:\\cve\\X.lnk",
        "C:\\cve\\S.lnk",
        "C:\\cve\\D.lnk",
        "C:\\cve\\X86_A.lnk",
        "C:\\cve\\X86_L.lnk",
        "C:\\cve\\X86_K.lnk",
        "C:\\cve\\N.lnk",
        "C:\\cve\\G.lnk",
        "C:\\cve\\X86.dll",
        "C:\\cve\\T.lnk",
        "C:\\cve\\X86_Q.lnk",
        "C:\\cve\\O.lnk",
        "C:\\cve\\U.lnk"
    ],
    "directory_created": [
        "C:\\cve"
    ],
    "dll_loaded": [
        "ext-ms-win-kernel32-package-current-l1-1-0",
        "C:\\Windows\\system32\\riched20.dll",
        "kernel32",
        "kernel32.dll",
        "UxTheme.dll",
        "C:\\Windows\\system32\\rsaenh.dll",
        "C:\\Windows\\system32\\ole32.dll",
        "C:\\Windows\\system32\\sfc_os.dll",
        "dwmapi.dll",
        "C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\\gdiplus.dll",
        "C:\\Windows\\system32\\DXGIDebug.dll",
        "

Dropped

[
    {
        "yara": [],
        "sha1": "1636a28b1fcd42f21f2c14050fbc0ccfe2972586",
        "name": "ecbd40aba3c0fbd3_x64.dll",
        "filepath": "C:\\cve\\X64.dll",
        "type": "PE32+ executable (DLL) (GUI) x86-64, for MS Windows",
        "sha256": "ecbd40aba3c0fbd30a6eb4c5546f9c9c96afb7c51307e0d2b91f5083e9cb0d17",
        "urls": [],
        "crc32": "8E4FD222",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/ecbd40aba3c0fbd3_x64.dll",
        "ssdeep": null,
        "size": 970752,
        "sha512": "ffd47f953cfa8779c5b3ca6d67fb324b3b2ba8c5934949bfcf29dbd3c54821fa9c389df6177d918b7f9f07421f2400e0c53c4426b112db0a826bb38c88806d76",
        "pids": [
            2800
        ],
        "md5": "cf2260c0c1bd9ccb01fd48ac18d58545"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "d5a72aa1e4eb5a0e36f12e86d57748dbe65a27bf",
        "name": "46b7be65813b68b6_m.lnk",
        "filepath": "C:\\cve\\M.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "46b7be65813b68b676bebdfba5898bdae4dd3232f888091e73ac7d5b7826839e",
        "urls": [],
        "crc32": "3F15E884",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/46b7be65813b68b6_m.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "96fde38d7243ee934206fd6495213651b6b594202fca5eb02ef62e8e0b250bd68984f10d41a6b833e3f7dad6e69b9d19e58e379054293ec9ca745ae9815e86f3",
        "pids": [
            2800
        ],
        "md5": "634a0b75ef72dce5239b411b3c5caa7c"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "8412a06e84fa0e9d027cff08f690687dba974664",
        "name": "7a0c1a2638560108_x86_u.lnk",
        "filepath": "C:\\cve\\X86_U.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "7a0c1a26385601085669fc5e4968a7c0c83254a1db743231d0ad389f08b436b5",
        "urls": [],
        "crc32": "F367F2D2",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/7a0c1a2638560108_x86_u.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "be1ad0af54169a6a4089659006738f9e4ef27912bb800876a5335511f9c180d5813ee07ce525498be092c1a7add26a75caf1ca5de2910b87e98bbb6bcde43e0a",
        "pids": [
            2800
        ],
        "md5": "8dc56f9ca1b6b787e67867196d9532f0"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "728a40682d30f2376bdf25100f9ea8a41cb9fbcb",
        "name": "fbe45976387a51af_r.lnk",
        "filepath": "C:\\cve\\R.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "fbe45976387a51afef8553359fbf4f655c3ce5e6c73c486b4eb4697bca572935",
        "urls": [],
        "crc32": "5AC01B38",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/fbe45976387a51af_r.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "e7c16826d1f66650a7a5b9529fdf406a2c0eed11305867d7bf755807be8cbe00e0f2753f589091ddcad19f35ab164e5b8bc49cf45abb63faec2cc8baddb35cba",
        "pids": [
            2800
        ],
        "md5": "72457b5fb1ed19f98318c8c8d4038f80"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "368175562fd930a2d65ec7449bf691efb72ba149",
        "name": "6c37d57ded084713_x86_v.lnk",
        "filepath": "C:\\cve\\X86_V.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "6c37d57ded084713ca21d5e90daa259a2d90d8afa2a386f8e438aa8e8de860f9",
        "urls": [],
        "crc32": "18CDBA6F",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/6c37d57ded084713_x86_v.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "36719b35d8bdc7dfd1d28ae17c44eebad022a5dd3936036de3ef9d8df8e2a1cca6ce6a63e3af921640a1aa86425f65b73529554798a970d28fc10c09d0d57cf6",
        "pids": [
            2800
        ],
        "md5": "5b7ce4918b3a74501298cdc8b94fda2e"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "859202a2c98bc60ec60c79070e57416f610d1110",
        "name": "c4a9355de728303b_x86_e.lnk",
        "filepath": "C:\\cve\\X86_E.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "c4a9355de728303b5d1238261f573d7d66a2620718d191e93485f50b1dc7a5ea",
        "urls": [],
        "crc32": "655367A5",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/c4a9355de728303b_x86_e.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "17bc45c2dafd61505881b0919833556da9767da776e0b0bf437cb46a83f762cbd6bf04879d1df1a0c3e5226035973192ca7a285c6858158174b22a62f5858541",
        "pids": [
            2800
        ],
        "md5": "c7b62947d30bc1a526cdca8739acd8d5"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "272860902e72bb9bafadb11582466c152f810ce9",
        "name": "b98fbf6696841210_a.lnk",
        "filepath": "C:\\cve\\A.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "b98fbf6696841210c45b387ec3fd8123c7dfc1bf8c43d49e7bb1825884d0799c",
        "urls": [],
        "crc32": "275EC6F2",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/b98fbf6696841210_a.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "a328cd3c1024ec0b5a37ae922a454ddfb126988c64890cc6dac4d3a45f29a519db9692961f597fdcd346fc9351847f4f0c0205378193263019f463cc3b67f8e3",
        "pids": [
            2800
        ],
        "md5": "fa7418cba9c28eada8c23806e4da4452"
    },
    {
        "yara": [],
        "sha1": "da39a3ee5e6b4b0d3255bfef95601890afd80709",
        "name": "e3b0c44298fc1c14___tmp_rar_sfx_access_check_9697140",
        "type": "empty",
        "sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
        "urls": [],
        "crc32": "00000000",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/e3b0c44298fc1c14___tmp_rar_sfx_access_check_9697140",
        "ssdeep": null,
        "size": 0,
        "sha512": "cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e",
        "md5": "d41d8cd98f00b204e9800998ecf8427e"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "3ed8f27ae7e36b9025810d6f87fc1fb4e8c4512a",
        "name": "5583c3f759254263_x86_r.lnk",
        "filepath": "C:\\cve\\X86_R.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "5583c3f759254263f64ee0794e4f025a7bb5ae26df038605457b1c10652c30fd",
        "urls": [],
        "crc32": "A6245D82",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/5583c3f759254263_x86_r.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "e7e3ec30af1a5cb181916e32e0c9e2bd11d55ff83f7b356082a8fec8c00cac48d73586eb878ebec1532df9d89416b35ed912ebf8e160f28825d24e524e9e0399",
        "pids": [
            2800
        ],
        "md5": "b28dd5c8b8ca61feb997a09d5bf45495"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "1da63ebb2225873ff09e55e517e8b2aee30b6ad2",
        "name": "2b8cd63d1f90a122_x86_g.lnk",
        "filepath": "C:\\cve\\X86_G.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "2b8cd63d1f90a122f6c20fdb0a25443751b9feadc3f2bd548630262d0c208dfb",
        "urls": [],
        "crc32": "D79F1773",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/2b8cd63d1f90a122_x86_g.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "c1f404cb797a52494fb17d786788688a3b892c607f52b283d2c99c51e141b3969590843a2a76a90a3ed2180faf776d70834cfee1abe4d10c7b96d8494b8c8f17",
        "pids": [
            2800
        ],
        "md5": "a34e6181ab7469a2bc19d4e3a19d5d3c"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "474ce7e861c894dcb0ac3ddcc5a9d8fd55778c24",
        "name": "670e1e76e4c4d21d_x86_l.lnk",
        "filepath": "C:\\cve\\X86_L.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "670e1e76e4c4d21d89b19a617d45da26235622a0cc8fc6cd2ec2844379ca0c50",
        "urls": [],
        "crc32": "9A979655",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/670e1e76e4c4d21d_x86_l.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "a2f41a13b4bb24521e95e89238524b83596fecb8efe43aee8bd162ee6c6e72c93f005ec67d5218dc6397244e1f53849ffed67fd4465a945769a399b1068c3cdc",
        "pids": [
            2800
        ],
        "md5": "08e7f63b1e55f5027caf587d9caca62e"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "36bba472a0962bfa4b5343137c305bbc2002f87a",
        "name": "d239c53eb69f16cc_x86_z.lnk",
        "filepath": "C:\\cve\\X86_Z.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "d239c53eb69f16ccd106bfd5ccaea8ff42c667b05380517d9b4d3e765bb95934",
        "urls": [],
        "crc32": "00869419",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/d239c53eb69f16cc_x86_z.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "9798f4a84625405322a0dd11408f96b302a5391e45bf01f63a149af8754ecfcf427481b4ebd33367376803bb5e060c97f05b6423c5f2178ebad2296a9c7e200f",
        "pids": [
            2800
        ],
        "md5": "c064e1b0c9688d4207619e57a8f19576"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "d4ce787273fecdbf93b92bc3245cb8cebe91cb98",
        "name": "34138b92e656bb49_x86_k.lnk",
        "filepath": "C:\\cve\\X86_K.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "34138b92e656bb498c454e6817ef4e7f20e3716376223f7ea6c5da6e20e977ee",
        "urls": [],
        "crc32": "CFD43905",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/34138b92e656bb49_x86_k.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "a88aa25c8500cd35cd293e35ed390889d01cb34262273f6f6a113bb9f63952c172b06b941ffafcd26cc4a31a2439e9ba79e10f74094aa65a832bf5ea4fa1b2a5",
        "pids": [
            2800
        ],
        "md5": "477ce783bbe0b0deeaeae70889d53759"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "ea737c329d01b587cadb1e15e4d35408aa771214",
        "name": "7094925b1a691dca_x86_n.lnk",
        "filepath": "C:\\cve\\X86_N.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "7094925b1a691dcadc1fed10334d6423c2e8c3286c47a9b18651ac56b322a694",
        "urls": [],
        "crc32": "285BE683",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/7094925b1a691dca_x86_n.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "6a3ad2fa64271fb3a6e81184a772322250ad0be7407576c96281f21a83fd385c0115283a4a3d71ad6e0aef58e54c3ac81b886cba5ec444bce768d7cba0feaca1",
        "pids": [
            2800
        ],
        "md5": "e693c75fc33c1908e9127f12c0a6980c"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "9a85f16ff3e878a1e42c9f44680c45dcc387ca05",
        "name": "5d9595e16ebf9289_i.lnk",
        "filepath": "C:\\cve\\I.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "5d9595e16ebf9289f8f16bb0e8b1416d0ab6c82a231f937793855a63dd2cab8c",
        "urls": [],
        "crc32": "81FC0F69",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/5d9595e16ebf9289_i.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "3141158a7ab3f6941dddb56ff287e2535dd446136563fc2fdd31daf43c1ea8a64b2779744a6bca82ea3a0d73b5e08a772d877f3163efac35e39385612407f972",
        "pids": [
            2800
        ],
        "md5": "825a3b738f263a6558568dfe75c1ea8b"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "0fba363c19e77d41f113d4b6760eb9aae6c1a88e",
        "name": "4eb7dbd886f2f868_w.lnk",
        "filepath": "C:\\cve\\W.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "4eb7dbd886f2f868a66f09ea00df57ac5f02e9881f0d473dec169f8bdd9ace2c",
        "urls": [],
        "crc32": "BD4FC4BE",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/4eb7dbd886f2f868_w.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "004cfbe188272020595fc08dd9342cf96967a0942876f209230854e95a2b6acdad67105902360c48a74b96a012fa50bae92ceb37b22a41930edd88404885cfcf",
        "pids": [
            2800
        ],
        "md5": "bd2b5af622229d85de4472d3fb412e56"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "7e009c8bf2616e2bf47876f7e3292822e221fc7f",
        "name": "0fadc89714d32543_x86_y.lnk",
        "filepath": "C:\\cve\\X86_Y.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "0fadc89714d3254399cf76ec412f684d825ede3794ad1bcf3392ea4d58e4b9dd",
        "urls": [],
        "crc32": "EB2CDCA4",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/0fadc89714d32543_x86_y.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "b3e59563c5ae82dbeed52573e3381e389e7d292ec57e6b5a9816c0cb8cdca46082b006c184692a7dfe8632ac74ed2f84ee3a1d209944a5fbab36472b0e82fe8f",
        "pids": [
            2800
        ],
        "md5": "7e11c1cb37eb9f70b29397c8947a9d7b"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "59d3b3d16c4e53bf91b7f853712f8ff1bf519b85",
        "name": "8c358b6079323564_x86_j.lnk",
        "filepath": "C:\\cve\\X86_J.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "8c358b607932356434e6df13256b08a5e7f28bc87dc364a3d8ec388ea0cc6155",
        "urls": [],
        "crc32": "96B2016E",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/8c358b6079323564_x86_j.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "e20f867c1514cc515a1f4049c2670ca41afcd3505c0f64dbf5fcade423ba7946466bb5f755b1e66b6a5b49263ac76b0baed8db2cc2223058cd75e719efd32ede",
        "pids": [
            2800
        ],
        "md5": "cca704f9f5f9a053bf477df736ba74e6"
    },
    {
        "yara": [],
        "sha1": "07cea6bee63843f0cc12fe78a9a6d5c5019d18e9",
        "name": "f403821e3c0fc1f9_x86.dll",
        "filepath": "C:\\cve\\X86.dll",
        "type": "PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed",
        "sha256": "f403821e3c0fc1f9dd27b143952418bee909f3e079a2c31541b733402ed4e85a",
        "urls": [],
        "crc32": "2F9D72DD",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/f403821e3c0fc1f9_x86.dll",
        "ssdeep": null,
        "size": 742400,
        "sha512": "5d84b292c21dae03e00d9f1e047707e39642b0c0201f71214357079f557ab3338e07848f5bf2e9bb756a225563a503eeeb890ede39e975f6bc03784e5cfcc2bc",
        "pids": [
            2800
        ],
        "md5": "80c80cac0c234d07fe31b5e66479b0f5"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "7eae95dab0f85aa5f9a9eac9db267d41f72b16ac",
        "name": "0a03b8d1e1bc0e64_j.lnk",
        "filepath": "C:\\cve\\J.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "0a03b8d1e1bc0e64fe2d6d61f84c1fce411fe18ffdf9b1a5f1ea5c453250569d",
        "urls": [],
        "crc32": "6A5647D4",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/0a03b8d1e1bc0e64_j.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "078ebc83b40cdf95ef72c62776138c9a277b95249aa74f5d160e4a770d8abceef867add9f313154fdea52b2327692297e6d2453761ae5a984c76d7d469f06219",
        "pids": [
            2800
        ],
        "md5": "81772206d9e9e7f6291725d182e01038"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "6a7936e7738429ae17934629a9584ca63b5a4f46",
        "name": "0c0d6e0d6031d81f_x86_t.lnk",
        "filepath": "C:\\cve\\X86_T.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "0c0d6e0d6031d81f50391afe12400204020d5c8aa2a48dd8cb5f7da49566e875",
        "urls": [],
        "crc32": "AA01CAB9",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/0c0d6e0d6031d81f_x86_t.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "9c730be47c959a77a2aa13639ad9ad82cdb0bfc3114f65085cc92d13ffc600bfccd9a5176e2eabc13d6e081832646839d7882123f4714f713e1a3ee96048d458",
        "pids": [
            2800
        ],
        "md5": "f8ab81d1d72e8b62de2b0876e92d558f"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "329fd6cc4aba7b3dad2b03f61e503d04bfd1b7e7",
        "name": "159149750f9449cf_g.lnk",
        "filepath": "C:\\cve\\G.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "159149750f9449cf4e83173122ea8a541004eecf4159614b4f994581975ae9f4",
        "urls": [],
        "crc32": "2B7B51C9",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/159149750f9449cf_g.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "b11652b08de3445aa6d3fef964664e53ae04befe0ea14e46a8b56a6d064bc00b8a4160313f32c418a45725bbcd4e17fb87d2b57ed20d1f923e1fcd1905a28f11",
        "pids": [
            2800
        ],
        "md5": "efd8c10f5ab58aa0e15521b20787e616"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "0664872fd55432e39242317af1cf1d0306e07bb8",
        "name": "b5a11bfdf8c6843c_x86_a.lnk",
        "filepath": "C:\\cve\\X86_A.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "b5a11bfdf8c6843c363e0c688314171baab5c8eabf30c83ef2e201396f25df42",
        "urls": [],
        "crc32": "DBBA8048",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/b5a11bfdf8c6843c_x86_a.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "5583cb919817e8d86a8d574ead1ac13bd20e9054732f6a9146f37ff5e815707939404f12ab1cc6bedd771e5913fbebb6a7692d9f8695082a3115a5a681dad554",
        "pids": [
            2800
        ],
        "md5": "3b780605ceed88cbdafd3611dd98a3df"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "bb3251875411ce2193cd0e964c9440694f2b875c",
        "name": "0e8bc39b8b4ebb89_t.lnk",
        "filepath": "C:\\cve\\T.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "0e8bc39b8b4ebb896e36f14e648f2ca7ee0d95f9f198918cfb47588e3d763f86",
        "urls": [],
        "crc32": "56E58C03",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/0e8bc39b8b4ebb89_t.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "e709c397ca83a7be2a0cd79b3cc67859b7d72502fe499ac6bc4b23c4889098c161a88f02e74504d9a07f5865fc00ead71238b95d7b34778e1623170a59daaade",
        "pids": [
            2800
        ],
        "md5": "5faf0a9f2ef3ffcdc15ddd21571c7b7f"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "88e4861a726f4654782f32db182e6a20b41039e3",
        "name": "415a48c12c09b40d_q.lnk",
        "filepath": "C:\\cve\\Q.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "415a48c12c09b40dcaf6add4ca2686e1c96cae549409e4948ed61ed165f35f5a",
        "urls": [],
        "crc32": "B16A5385",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/415a48c12c09b40d_q.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "c56d28957f0ce254400c58208b5611392468ba6728ce3e281da945aa60d77f667be6adc192d9e9ed10f9c47ca0c7917f4d6b1815b17196f0604c21305ab8f367",
        "pids": [
            2800
        ],
        "md5": "9d4c701099ca37269f6ffe96eb3d6e68"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "2617ee020977bf29ea5012f6193a135dfe680ac9",
        "name": "951c7e474e4d0a55_x86_h.lnk",
        "filepath": "C:\\cve\\X86_H.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "951c7e474e4d0a555415fc0a8f43d7875c5f0c9bb637f1a107c02c45963392c6",
        "urls": [],
        "crc32": "247E71B8",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/951c7e474e4d0a55_x86_h.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "142c23d9d23985f1a08909aa3b349c4eb005a295a8d16594bed648a22e328c4502feff687bff72d0a8a28c4671acbe13474e3f40f84601e13ade0f824c27e5c8",
        "pids": [
            2800
        ],
        "md5": "1f6b1f1b991688b72043fc4b84395398"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "e0afaec21e8a477b5eefd183ead1fa0746f98e4a",
        "name": "ddac3ac022689e52_x.lnk",
        "filepath": "C:\\cve\\X.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "ddac3ac022689e52b3ab96f5e9c616755450ab6a5ed8a5c72c093818b46d40af",
        "urls": [],
        "crc32": "4EAEA275",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/ddac3ac022689e52_x.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "34a0de2f633812c819f72e3f1b92b3d5fa48b65e9dd28d5a20b528aa58e0ff686b04a5a8a7e88a6073f6adfd42900834b4e7ae11052defcafb9a15777f705343",
        "pids": [
            2800
        ],
        "md5": "2a2284444d38c145a54f24c8a1321e80"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "255bb1974ae811471e76233b385e5a315bd5bed7",
        "name": "19069159618909e1_h.lnk",
        "filepath": "C:\\cve\\H.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "19069159618909e1ac01891247034f02b89c9664ee8983e6d27b1e787abe3edb",
        "urls": [],
        "crc32": "D89A3702",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/19069159618909e1_h.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "e41aa19c167cc392b29606256450ba3dfeea1f71b21c340e0c865411db360eb9dc37b2ee840f9b512d759c5277a9242bb225175465d94d03b8809d0961415d2a",
        "pids": [
            2800
        ],
        "md5": "177ff9824c9b306e4792ed3bcc6a5627"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "143b7fc19b24fba1b760fba0cde9d3cd9ef2abdb",
        "name": "65c0ffeeb77d06e6_z.lnk",
        "filepath": "C:\\cve\\Z.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "65c0ffeeb77d06e6668bd44ee2f74ae1b22689bc57425b1223acee262d1f8101",
        "urls": [],
        "crc32": "FC62D2A3",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/65c0ffeeb77d06e6_z.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "2fc2d206090fd46937444dc03b8d002611b649b277bf72e4ebe40e90f87e538b5c853809b9d483722ca953efcafe6912b87763c816d8ead706af7448eb1a3f2d",
        "pids": [
            2800
        ],
        "md5": "1f31d0d6f854a8fd95c34fed855e2f0d"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "7063af1ad0db46902c143e3b759414cf6ba1041f",
        "name": "6364d43f503c1603_x86_q.lnk",
        "filepath": "C:\\cve\\X86_Q.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "6364d43f503c16031d6b25df06cc7085aa98fc312a1bc0e62426876b3c3ff7bf",
        "urls": [],
        "crc32": "4D8E153F",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/6364d43f503c1603_x86_q.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "6635d447623d53b827c2b346291a7d81f627816aba6188dbeb5a50cd750dcf8d60e467e16bce4f7b21f6425503b939c06fbe1fd4f76b0a493921cd3879246041",
        "pids": [
            2800
        ],
        "md5": "c3ca2d7ac38d9a140833a4812cc10145"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "8231755cf5048f737c26775258b0f8377f0c4264",
        "name": "d411343a970c6938_x86_i.lnk",
        "filepath": "C:\\cve\\X86_I.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "d411343a970c6938124f450488b9020ef90ec74564724caaf24179e5950a1742",
        "urls": [],
        "crc32": "7D1849D3",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/d411343a970c6938_x86_i.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "c0474b1ae1c092dcaa636dfacf85c09ecc26f39bbb78c0a35441391c6bd6bb4267a681d54795815726adcb94ef4532d66f14b25831ae03f350c0961c1aefe2d1",
        "pids": [
            2800
        ],
        "md5": "92c9d2a8be495b54b59006b16817329e"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "80877a8f3dcc1d3452ff423d4de923a5ed4a72fa",
        "name": "17ea0429a5af27ca_x86_b.lnk",
        "filepath": "C:\\cve\\X86_B.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "17ea0429a5af27ca0f89c3dcbebeb84e32613085661d6fcbc8bb131e80995e03",
        "urls": [],
        "crc32": "3010C8F5",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/17ea0429a5af27ca_x86_b.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "b88dbc8a7af9bf846a5ff444592345c37080245b807db02ae8bddbb4bdbbab37626bde037fae59b373c74bafa44b82e2fbe9203a61f801027e2b0b25e26ed176",
        "pids": [
            2800
        ],
        "md5": "d7eceedd3303de887d38013c5187bf29"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "36d05e93ba80e0c4e7562cbafc5abf302afe7404",
        "name": "d2265ab2881c4315_x86_o.lnk",
        "filepath": "C:\\cve\\X86_O.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "d2265ab2881c43158d75d472b43224564aaa2630ed327ab6575fc92cae7f7833",
        "urls": [],
        "crc32": "713DDEE8",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/d2265ab2881c4315_x86_o.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "15ce88e453bcfa427c31fc5222eccf7ac4b878a3ed436e9e1a8a8a82979730ca33e261c23c74251818297fe5de0825f100ca5465835dd8d56ab1c3789efa19eb",
        "pids": [
            2800
        ],
        "md5": "c4af26ba5f8148c733df910a2755b317"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "fde1f5d55dc65c10aa3a49e61351474504a209b1",
        "name": "391ac5c069f004da_x86_p.lnk",
        "filepath": "C:\\cve\\X86_P.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "391ac5c069f004daf3a66dbafe77fbc6c47b8e53231a8f2bbf6226fa0edaf195",
        "urls": [],
        "crc32": "14E82D54",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/391ac5c069f004da_x86_p.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "bdd4d5e9b8096b6520350b09879204f857465c9afa4800af05021906ef0d6f6da4fd88ee09eca4b75209027a5b9f3a74a7d6f6085b7571f1f8d99fc42bfa8d53",
        "pids": [
            2800
        ],
        "md5": "438a0e446edbcbecd9a291400d43833f"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "c8c41509eb3a08b0a684648c7711957cfb1dbeae",
        "name": "251d8699bf4a8ab8_y.lnk",
        "filepath": "C:\\cve\\Y.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "251d8699bf4a8ab8bae835274ff308e52ae6312c2fd922efbad56473d7bf1a5e",
        "urls": [],
        "crc32": "17C89A1E",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/251d8699bf4a8ab8_y.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "5d228290cb318fac9f0b165d37cc4d4cdf0af06c67aa1d4e4385c2deda930d52d7635424018a8589def9e31a3487fec671ef14d7d71f740d06ab10fae850250e",
        "pids": [
            2800
        ],
        "md5": "8070ebe7fa1352ab48d33fe6ae88cd85"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "597db4255c1b755ce38798a9b806df23c3dbbceb",
        "name": "65be450212d752e8_x86_w.lnk",
        "filepath": "C:\\cve\\X86_W.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "65be450212d752e8e6c5e7977a9171e9651b361488c687e3b22ccb9cc09abe4d",
        "urls": [],
        "crc32": "41AB8204",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/65be450212d752e8_x86_w.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "ea961016e9b1fe77d670412092c8f8c92034d6499b0d09c6b06a55d7b4ab152d44b6a436de61111fe42f425a6c95596a14797683517ff555c8cb50aca26c1331",
        "pids": [
            2800
        ],
        "md5": "1679f5a269e188fdbc7cadeda88a7f00"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "e4329b700e97fb9952a305ec5febdcc3504378ba",
        "name": "d42727653d5429bb_e.lnk",
        "filepath": "C:\\cve\\E.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "d42727653d5429bb9ee58af78886c59018f11953571cde97b1e8c09ed20fc0f0",
        "urls": [],
        "crc32": "99B7211F",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/d42727653d5429bb_e.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "74cfefcebc9357b291205c9794b4266f1d3b9b11ac3c19b918a704aa57d405c07e977c37320f2f6ab77018609ddaba52c56ae89a6b94841c097e036a70291bb0",
        "pids": [
            2800
        ],
        "md5": "d55788a651c6e335a4670b2d668c8f51"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "826571094e7d6f35764b26599a1dae7cf080c880",
        "name": "100b1dcefb0001ec_b.lnk",
        "filepath": "C:\\cve\\B.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "100b1dcefb0001ec8a344cb21717395af07cf061da464e10b1e5029cd3b41a32",
        "urls": [],
        "crc32": "CCF48E4F",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/100b1dcefb0001ec_b.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "dab739e75acdd086f860e25139a256cb51daaff76035d5f9d0f2e8578d0f6ddc6573d0d93418f110fdbb1aea27b6ec0ba4d0eb3e122035c2a0f58852359513cb",
        "pids": [
            2800
        ],
        "md5": "ed8e28415ef57faf0c59655dbb15c384"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "22bd72115b1cabf491154fcb1054058fdb4a8f57",
        "name": "86acf042ab817f86_v.lnk",
        "filepath": "C:\\cve\\V.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "86acf042ab817f8697f586e416f2c5c5473cc50b048d45b643978efa417befa2",
        "urls": [],
        "crc32": "E429FCD5",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/86acf042ab817f86_v.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "ab996f96c61fc8f8966b6d4ec8c18b406d97b09a9289804d91a9bc01fe093ecacf041bd34366a5e29bf8bf5e5f16bf8b35cdc912a5d0e37c3a88fb34bdee9168",
        "pids": [
            2800
        ],
        "md5": "fde4f8a9850c6a066790995009013bbe"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "65b38d2d98fe79a20451235afb8b008a62eafffd",
        "name": "236bcca2c6d81bf1_d.lnk",
        "filepath": "C:\\cve\\D.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "236bcca2c6d81bf1338ed7a15c29d62c145072ff0872794d70d38cd866538487",
        "urls": [],
        "crc32": "C0D11974",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/236bcca2c6d81bf1_d.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "06fc1d9c5a2122a3cf05c1c2faba9fca6d9d723520cb4495e93caf7cb877dbca2842111166738cb4ce2d3f1ef4f9341f37e47960b344dfa6c536df214c78f2ec",
        "pids": [
            2800
        ],
        "md5": "0ff155f2b8f4910067a24268cc620168"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "2e14622e2752d916bd55cc88a98896276e78eb19",
        "name": "d8f8760d3a1e7e55_x86_d.lnk",
        "filepath": "C:\\cve\\X86_D.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "d8f8760d3a1e7e554c767389a18c23d9eca6b8f296cdec4f2042012579983329",
        "urls": [],
        "crc32": "3C355FCE",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/d8f8760d3a1e7e55_x86_d.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "9c088d8dc22f43a0e284c9ae9b65a7383b5ca70808aa26428b299f36b7fcd035ce7cb9e95525a3e203c352d3468cd00f3279f1b146e65f4e972a38dd94c6c0db",
        "pids": [
            2800
        ],
        "md5": "0d56c32e378d0ecff2bd88b0bd04b800"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "951382e22b66da10ceae44553420248350051e3b",
        "name": "fc2da8995d14cc5e_c.lnk",
        "filepath": "C:\\cve\\C.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "fc2da8995d14cc5e42767bda009e47bfafcf99489289fb2f0840c8cf8f8136b7",
        "urls": [],
        "crc32": "9592B624",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/fc2da8995d14cc5e_c.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "d5d1b9192d15407a8f64d7e40f1aa34fef409996f4b775e5bb2fd1c8aec6cb9865f62034a93f9b3b671ced69bb0ad2193c62e29aea3cab5f3c7432ffe9c802b9",
        "pids": [
            2800
        ],
        "md5": "aaa1039f3864e38b21078c70ea7cb8a7"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "92fb17b6857c9cff8b2c46ccb2b091c2fdf749c9",
        "name": "12774b6d495d20a9_u.lnk",
        "filepath": "C:\\cve\\U.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "12774b6d495d20a94827d9b2dcadfe1371fb57518cc108982d6db0664b00a484",
        "urls": [],
        "crc32": "0F83B468",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/12774b6d495d20a9_u.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "0a46cae874b59845eb0011a5984a7d730f9847ae7c790c1b27fc2ec49ddfbdc98cfaadae3ef6304dc58d30dd137b16d501d6e6a6a8901580d2a1ff30db078168",
        "pids": [
            2800
        ],
        "md5": "3a8ee5202006ecb7535b7e69dcfb41d9"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "411d13fd40507c2b8e5ddb5c158b0cbd5a2bf51d",
        "name": "1bf127ee03f4d991_f.lnk",
        "filepath": "C:\\cve\\F.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "1bf127ee03f4d99169b15062c06b972cc67b6553c69ad0e3f52d7fdc9358eb79",
        "urls": [],
        "crc32": "721D69A2",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/1bf127ee03f4d991_f.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "f106ac89ad6ed58ed5e5a5e50bb383f1405db3537e9ce2cfe9ea17d660a6408a3163003c75a8cccd757cfc147039dd4dd697c29ab35a29af988b84c71d5fff2f",
        "pids": [
            2800
        ],
        "md5": "4652237ecb56843d62d204c6bab805c8"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "6576c2843b10c2c096fe9bbbcff593263a5c99d3",
        "name": "407d0ca51c16b6f6_k.lnk",
        "filepath": "C:\\cve\\K.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "407d0ca51c16b6f663bf629821df8c50d49083a193aaa2dcf9d30f5526317025",
        "urls": [],
        "crc32": "33307FBF",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/407d0ca51c16b6f6_k.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "6dcf15c85fa928a7d8b85ea66314433b6434e42088519ecc0d114b7de6e04cecaabaac89652ba0c3260b0ff52f1ed23d1e83f9d68e2c56ca1f9d0e56dbe4e7e0",
        "pids": [
            2800
        ],
        "md5": "ae6d03b0218dace23488a09a117010bc"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "5d83da24e8b86290f0d7fdcc1084a9681ad8ad1f",
        "name": "cae7f9332846c01d_o.lnk",
        "filepath": "C:\\cve\\O.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "cae7f9332846c01d3c445f2c0628209ec9f961ed7263c75e444f60e33b64d021",
        "urls": [],
        "crc32": "8DD99852",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/cae7f9332846c01d_o.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "e1848bd18064e88c3351ac316967a7688310c2c2191aab6a15c4e1b4a7ea8a2a6db4bb85d96bfb883600f0c2736025c588db477c7ce9ab2ef8e9d0e3f90d0d15",
        "pids": [
            2800
        ],
        "md5": "38d5bb64a5911bfedbee43c29ac2fbca"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "9dc9f304d8c018c6c5d06fa8dce1cf976b52b7a5",
        "name": "f6132b904aaf9cff_l.lnk",
        "filepath": "C:\\cve\\L.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "f6132b904aaf9cffafdbf44c864e9f13f5edef98591da986ad4ea556dc891377",
        "urls": [],
        "crc32": "6673D0EF",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/f6132b904aaf9cff_l.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "5c2f6ff012aa32140a7bc6bb01a777bd48b1f97c1c4c62548646e94c8ace3e00bdea639f1e0a821b1dcc37dc4c7436f56e91dd2406f217300bbe702a248c70aa",
        "pids": [
            2800
        ],
        "md5": "7d3e682d43b3231ae0fb58df10a1dc22"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "eb7b19e23df5cef5d8889f467d3c3a2cba8077da",
        "name": "02f5ef2f41f8dcbd_n.lnk",
        "filepath": "C:\\cve\\N.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "02f5ef2f41f8dcbdd9497980e34c2b4718b2113caa7727716357283ee5bf2503",
        "urls": [],
        "crc32": "D4BFA039",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/02f5ef2f41f8dcbd_n.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "f29f384c4992dadad70d8716ba70554a38780cda7dd13d16034f590e0a201a7b67a3641b1e17f509adbcc32115765b43f5ed30806d1b75ca0b9905c5be7ba532",
        "pids": [
            2800
        ],
        "md5": "406a4969b8cc1de35089fe207ede2f1e"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "df2ca8914d66931be05ea2803071f6dcd98de21c",
        "name": "f96ceaf2083c0785_x86_s.lnk",
        "filepath": "C:\\cve\\X86_S.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "f96ceaf2083c0785f130d7380ef6f0ddf00b3dab0697558ee9fe92650a0f9687",
        "urls": [],
        "crc32": "FF4265E9",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/f96ceaf2083c0785_x86_s.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "748359988959b40213797007e34ac02b3097f82ba83202079e4f4427cc3a5f141c71dabbeba63280f42ea728241a0b1c49cbccbaa9fdfcb0b724276823b5059d",
        "pids": [
            2800
        ],
        "md5": "8a09352a84ac82e28b0eefc965d528b0"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "13c61170aee7b2dd55ed7acf21af70548489b823",
        "name": "a8beae6469efc9c2_x86_m.lnk",
        "filepath": "C:\\cve\\X86_M.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "a8beae6469efc9c24984ae1997087d4bdcdd101ffd73a941238aa580bd4de8f8",
        "urls": [],
        "crc32": "C3F1AE3E",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/a8beae6469efc9c2_x86_m.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "2fa306cfff8020f59a7332dd93eb01f84e6f9deaef68ae0d9e1458a191d6c5d91f458245d7aeabebda7b49dadf225f450f27fa34dacbbfd9cbf3d2d1e4014d72",
        "pids": [
            2800
        ],
        "md5": "5e0dd0ad3bafe3195200c7585ede7f2d"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "759533c067740a4ba7a28de3b82116786078d706",
        "name": "dc85bdd6c0aa23fe_p.lnk",
        "filepath": "C:\\cve\\P.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "dc85bdd6c0aa23fef8c496031d84fbaec718e3e57fc628cd0c60ee0db38107f3",
        "urls": [],
        "crc32": "E80C6BEE",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/dc85bdd6c0aa23fe_p.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "2d69f4b89f0573f051f8f50b38bebef1f3034a7aea50ff2af387ad7dbaf6d572aedd8053f287521cd79c9b8dc6a67b57f0613bac727b3add55c6144269f4c184",
        "pids": [
            2800
        ],
        "md5": "63d9b960f167a8d73869db3e67a42464"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "1e0399c1255ea54580a37bfb3212cbebbba317f2",
        "name": "64cb0416ddde193a_x86_c.lnk",
        "filepath": "C:\\cve\\X86_C.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "64cb0416ddde193a57e730e5f65acc4ecb113a7e11886846ccb81d6464962d80",
        "urls": [],
        "crc32": "6976F09E",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/64cb0416ddde193a_x86_c.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "234d305bed08bf11d7bd41f950aa36aca7629a173a53eeef81e3e1dc581deac44ab18816d485341ad39fece23daad70be45758293d54a77b233f4342712a80ed",
        "pids": [
            2800
        ],
        "md5": "64a4951eec898de70d8e75c9b5ccc365"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "1a33ebf154cc965b0939b1cc276c81e6dcc606a9",
        "name": "af87b609bd9bf4d1_s.lnk",
        "filepath": "C:\\cve\\S.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "af87b609bd9bf4d1fffa05a944d1a9ad4e23f3bc8da7e722a0b4cd94809a48b7",
        "urls": [],
        "crc32": "03A62353",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/af87b609bd9bf4d1_s.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "e2b54ccb470d9bed516223964e6ed55af2330fd956930ea84d212a3fec6f8bd1ccb205405a19554b65e87a394f88b4073233c24dd8ea377abf51a08e0b3f10b0",
        "pids": [
            2800
        ],
        "md5": "a3c920509e609b0f1d2e587979b8ec8d"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "9ac8ce5f14f357a89d150a322dce059781083bef",
        "name": "f2065d0702965cc2_x86_f.lnk",
        "filepath": "C:\\cve\\X86_F.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "f2065d0702965cc28fe69d1b9193e3ab8e510edaea7db8c9b983b5606dcfd8c7",
        "urls": [],
        "crc32": "8EF92F18",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/f2065d0702965cc2_x86_f.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "f7ff5afbd7a21b183faea682f0cb5b0767ab8254252ee4158b1668c9299e974611269ea2ad77feaa84a6ad5cd6ab472c354019195a7c33687502f169bbf7dc39",
        "pids": [
            2800
        ],
        "md5": "f840216d3d31b905935cde1e21a0c8e8"
    },
    {
        "yara": [
            {
                "meta": {
                    "description": "(no description)"
                },
                "name": "LnkHeader",
                "offsets": {
                    "guid": [
                        [
                            4,
                            0
                        ]
                    ],
                    "signature": [
                        [
                            0,
                            1
                        ]
                    ]
                },
                "strings": [
                    "ARQCAAAAAADAAAAAAAAARg==",
                    "TAAAAA=="
                ]
            }
        ],
        "sha1": "4440ae1dc29d160a8bd2d4bc1cfb592ea6580393",
        "name": "406556a1006f3a38_x86_x.lnk",
        "filepath": "C:\\cve\\X86_X.lnk",
        "type": "MS Windows shortcut, Item id list present, ctime=Sun Dec 31 22:47:48 1600, mtime=Sun Dec 31 22:47:48 1600, atime=Sun Dec 31 22:47:48 1600, length=0, window=",
        "sha256": "406556a1006f3a381bc8aea6b1d2841582030bf6e5f01038062c5b7a7afec99d",
        "urls": [],
        "crc32": "B24AE4CF",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/923\/files\/406556a1006f3a38_x86_x.lnk",
        "ssdeep": null,
        "size": 212,
        "sha512": "3e0b4ab1c37ba5d9024815f34c336bae39a76bd2b45936cbebc8e81c1f0d918bb095670ca1917d704a11529854ffd156bffed2473493de1b5bb2141a7585a63e",
        "pids": [
            2800
        ],
        "md5": "647d11a4e7ff5b2fc17d9e4dd0803603"
    }
]

Generic

[
    {
        "process_path": "C:\\Users\\cuck\\AppData\\Local\\Temp\\29de263f0ef78fa757098df11c2d872525955c3da3c79e7e38e81daab0cfe1aa.bin",
        "process_name": "29de263f0ef78fa757098df11c2d872525955c3da3c79e7e38e81daab0cfe1aa.bin",
        "pid": 2800,
        "summary": {
            "file_created": [
                "C:\\cve\\X86_C.lnk",
                "C:\\cve\\X86_H.lnk",
                "C:\\cve\\X86_G.lnk",
                "C:\\cve\\L.lnk",
                "C:\\cve\\X86_R.lnk",
                "C:\\cve\\X86_P.lnk",
                "C:\\cve\\H.lnk",
                "C:\\cve\\A.lnk",
                "C:\\cve\\M.lnk",
                "C:\\cve\\V.lnk",
                "C:\\cve\\X86_X.lnk",
                "C:\\cve\\R.lnk",
                "C:\\cve\\X86_Y.lnk",
                "C:\\cve\\Q.lnk",
                "C:\\cve\\B.lnk",
                "C:\\cve\\X86_E.lnk",
                "C:\\cve\\E.lnk",
                "C:\\cve\\X86_D.lnk",
                "C:\\cve\\X86_O.lnk",
                "C:\\cve\\X86_N.lnk",
                "C:\\cve\\J.lnk",
                "C:\\cve\\X86_T.lnk",
                "C:\\cve\\X64.dll",
                "C:\\cve\\P.lnk",
                "C:\\cve\\X86_U.lnk",
                "C:\\cve\\K.lnk",
                "C:\\cve\\W.lnk",
                "C:\\cve\\X86_F.lnk",
                "C:\\cve\\Z.lnk",
                "C:\\cve\\X86_J.lnk",
                "C:\\cve\\F.lnk",
                "C:\\cve\\Y.lnk",
                "C:\\cve\\__tmp_rar_sfx_access_check_9697140",
                "C:\\cve\\X86_I.lnk",
                "C:\\cve\\X86_V.lnk",
                "C:\\cve\\X86_M.lnk",
                "C:\\cve\\C.lnk",
                "C:\\cve\\X86_S.lnk",
                "C:\\cve\\X86_Z.lnk",
                "C:\\cve\\X86_W.lnk",
                "C:\\cve\\I.lnk",
                "C:\\cve\\X86_B.lnk",
                "C:\\cve\\X.lnk",
                "C:\\cve\\S.lnk",
                "C:\\cve\\D.lnk",
                "C:\\cve\\X86_A.lnk",
                "C:\\cve\\X86_L.lnk",
                "C:\\cve\\X86_K.lnk",
                "C:\\cve\\N.lnk",
                "C:\\cve\\G.lnk",
                "C:\\cve\\X86.dll",
                "C:\\cve\\T.lnk",
                "C:\\cve\\X86_Q.lnk",
                "C:\\cve\\O.lnk",
                "C:\\cve\\U.lnk"
            ],
            "directory_created": [
                "C:\\cve"
            ],
            "dll_loaded": [
                "ext-ms-win-kernel32-package-current-l1-1-0",
                "C:\\Windows\\system32\\riched20.dll",
                "kernel32",
                "kernel32.dll",
                "UxTheme.dll",
                "C:\\Windows\\system32\\rsaenh.dll",
                "C:\\Windows\\system32\\ole32.dll",
                "C:\\Windows\\system32\\sfc_os.dll",
                "dwmapi.dll",
                "C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\\gdiplus.dll",
                "C:\\Windows\\system32\\DXGIDebug.dll",
                "

Signatures

[
    {
        "markcount": 1,
        "families": [],
        "description": "This executable has a PDB path",
        "severity": 1,
        "marks": [
            {
                "category": "pdb_path",
                "ioc": "D:\\Projects\\WinRAR\\sfx\\build\\sfxrar32\\Release\\sfxrar.pdb",
                "type": "ioc",
                "description": null
            }
        ],
        "references": [],
        "name": "has_pdb"
    },
    {
        "markcount": 1,
        "families": [],
        "description": "The executable contains unknown PE section names indicative of a packer (could be a false positive)",
        "severity": 1,
        "marks": [
            {
                "category": "section",
                "ioc": ".gfids",
                "type": "ioc",
                "description": null
            }
        ],
        "references": [],
        "name": "pe_features"
    },
    {
        "markcount": 1,
        "families": [],
        "description": "The file contains an unknown PE resource name possibly indicative of a packer",
        "severity": 1,
        "marks": [
            {
                "category": "resource name",
                "ioc": "PNG",
                "type": "ioc",
                "description": null
            }
        ],
        "references": [],
        "name": "pe_unknown_resource_name"
    },
    {
        "markcount": 27,
        "families": [],
        "description": "Foreign language identified in PE resource",
        "severity": 2,
        "marks": [
            {
                "name": "PNG",
                "language": "LANG_CHINESE",
                "offset": "0x0005d18c",
                "filetype": "PNG image data, 186 x 604, 8-bit\/color RGB, non-interlaced",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x000015a9"
            },
            {
                "name": "PNG",
                "language": "LANG_CHINESE",
                "offset": "0x0005d18c",
                "filetype": "PNG image data, 186 x 604, 8-bit\/color RGB, non-interlaced",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x000015a9"
            },
            {
                "name": "RT_ICON",
                "language": "LANG_CHINESE",
                "offset": "0x00063ea8",
                "filetype": "PNG image data, 256 x 256, 8-bit\/color RGBA, non-interlaced",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00003d71"
            },
            {
                "name": "RT_ICON",
                "language": "LANG_CHINESE",
                "offset": "0x00063ea8",
                "filetype": "PNG image data, 256 x 256, 8-bit\/color RGBA, non-interlaced",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00003d71"
            },
            {
                "name": "RT_ICON",
                "language": "LANG_CHINESE",
                "offset": "0x00063ea8",
                "filetype": "PNG image data, 256 x 256, 8-bit\/color RGBA, non-interlaced",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00003d71"
            },
            {
                "name": "RT_ICON",
                "language": "LANG_CHINESE",
                "offset": "0x00063ea8",
                "filetype": "PNG image data, 256 x 256, 8-bit\/color RGBA, non-interlaced",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00003d71"
            },
            {
                "name": "RT_ICON",
                "language": "LANG_CHINESE",
                "offset": "0x00063ea8",
                "filetype": "PNG image data, 256 x 256, 8-bit\/color RGBA, non-interlaced",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00003d71"
            },
            {
                "name": "RT_ICON",
                "language": "LANG_CHINESE",
                "offset": "0x00063ea8",
                "filetype": "PNG image data, 256 x 256, 8-bit\/color RGBA, non-interlaced",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00003d71"
            },
            {
                "name": "RT_ICON",
                "language": "LANG_CHINESE",
                "offset": "0x00063ea8",
                "filetype": "PNG image data, 256 x 256, 8-bit\/color RGBA, non-interlaced",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00003d71"
            },
            {
                "name": "RT_DIALOG",
                "language": "LANG_CHINESE",
                "offset": "0x000682b4",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x000001ce"
            },
            {
                "name": "RT_DIALOG",
                "language": "LANG_CHINESE",
                "offset": "0x000682b4",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x000001ce"
            },
            {
                "name": "RT_DIALOG",
                "language": "LANG_CHINESE",
                "offset": "0x000682b4",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x000001ce"
            },
            {
                "name": "RT_DIALOG",
                "language": "LANG_CHINESE",
                "offset": "0x000682b4",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x000001ce"
            },
            {
                "name": "RT_DIALOG",
                "language": "LANG_CHINESE",
                "offset": "0x000682b4",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x000001ce"
            },
            {
                "name": "RT_DIALOG",
                "language": "LANG_CHINESE",
                "offset": "0x000682b4",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x000001ce"
            },
            {
                "name": "RT_STRING",
                "language": "LANG_CHINESE",
                "offset": "0x00068bb4",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000078"
            },
            {
                "name": "RT_STRING",
                "language": "LANG_CHINESE",
                "offset": "0x00068bb4",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000078"
            },
            {
                "name": "RT_STRING",
                "language": "LANG_CHINESE",
                "offset": "0x00068bb4",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000078"
            },
            {
                "name": "RT_STRING",
                "language": "LANG_CHINESE",
                "offset": "0x00068bb4",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000078"
            },
            {
                "name": "RT_STRING",
                "language": "LANG_CHINESE",
                "offset": "0x00068bb4",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000078"
            },
            {
                "name": "RT_STRING",
                "language": "LANG_CHINESE",
                "offset": "0x00068bb4",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000078"
            },
            {
                "name": "RT_STRING",
                "language": "LANG_CHINESE",
                "offset": "0x00068bb4",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000078"
            },
            {
                "name": "RT_STRING",
                "language": "LANG_CHINESE",
                "offset": "0x00068bb4",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000078"
            },
            {
                "name": "RT_STRING",
                "language": "LANG_CHINESE",
                "offset": "0x00068bb4",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000078"
            },
            {
                "name": "RT_STRING",
                "language": "LANG_CHINESE",
                "offset": "0x00068bb4",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000078"
            },
            {
                "name": "RT_GROUP_ICON",
                "language": "LANG_CHINESE",
                "offset": "0x00068c2c",
                "filetype": "MS Windows icon resource - 7 icons, 16x16",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000068"
            },
            {
                "name": "RT_MANIFEST",
                "language": "LANG_CHINESE",
                "offset": "0x00068c94",
                "filetype": "XML 1.0 document, ASCII text, with CRLF line terminators",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000753"
            }
        ],
        "references": [],
        "name": "origin_langid"
    },
    {
        "markcount": 52,
        "families": [],
        "description": "Creates a shortcut to an executable file",
        "severity": 2,
        "marks": [
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_C.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_H.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_G.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\L.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_R.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\H.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\A.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\S.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\M.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\V.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_X.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\R.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_Y.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\Q.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_N.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_E.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\E.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_O.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\J.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_T.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\P.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_U.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\K.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\W.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_F.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\Z.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_J.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\F.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\Y.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\B.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_I.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_V.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_M.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\C.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_S.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_Z.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_W.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\I.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\U.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_D.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\D.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_A.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\G.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_L.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_K.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\N.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_P.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\T.lnk",
                "type": "ioc",
                "description": null
            },
            {
                "category": "file",
                "ioc": "C:\\cve\\X86_Q.lnk",
                "type": "ioc",
                "description": null
            }
        ],
        "references": [],
        "name": "creates_shortcut"
    }
]

Yara

The Yara rules did not detect anything in the file.

Network

{
    "tls": [],
    "udp": [
        {
            "src": "192.168.56.101",
            "dst": "192.168.56.255",
            "offset": 662,
            "time": 6.2210290431976,
            "dport": 137,
            "sport": 137
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 2134,
            "time": 6.1631550788879,
            "dport": 5355,
            "sport": 51001
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 2462,
            "time": 4.1676349639893,
            "dport": 5355,
            "sport": 53595
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 2790,
            "time": 6.1752638816833,
            "dport": 5355,
            "sport": 53848
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 3118,
            "time": 4.6810939311981,
            "dport": 5355,
            "sport": 54255
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 3446,
            "time": 3.0548861026764,
            "dport": 5355,
            "sport": 55314
        },
        {
            "src": "192.168.56.101",
            "dst": "239.255.255.250",
            "offset": 3774,
            "time": 4.7522780895233,
            "dport": 1900,
            "sport": 1900
        },
        {
            "src": "192.168.56.101",
            "dst": "239.255.255.250",
            "offset": 7102,
            "time": 4.1899108886719,
            "dport": 3702,
            "sport": 49152
        },
        {
            "src": "192.168.56.101",
            "dst": "239.255.255.250",
            "offset": 11294,
            "time": 6.2672560214996,
            "dport": 1900,
            "sport": 53598
        }
    ],
    "dns_servers": [],
    "http": [],
    "icmp": [],
    "smtp": [],
    "tcp": [],
    "smtp_ex": [],
    "mitm": [],
    "hosts": [],
    "pcap_sha256": "d99e16178115f8dbd18a510c7b193eff7be33de5db6a3318aa4f6f52233be1ee",
    "dns": [],
    "http_ex": [],
    "domains": [],
    "dead_hosts": [],
    "sorted_pcap_sha256": "a4f1b760da2e25e991d57d25203c265070140fd4c049fd224e089bcca9458dd2",
    "irc": [],
    "https_ex": []
}

Screenshots

Screenshot from the sandbox

CVE-2017-8464.exe removal instructions

The instructions below shows how to remove CVE-2017-8464.exe with help from the FreeFixer removal tool. Basically, you install FreeFixer, scan your computer, check the CVE-2017-8464.exe file for removal, restart your computer and scan it again to verify that CVE-2017-8464.exe has been successfully removed. Here are the removal instructions in more detail:

  1. Start FreeFixer and press the Start Scan button. The scan will finish in approximately five minutes.
    Screenshot of Start Scan button
  2. When the scan is finished, locate CVE-2017-8464.exe in the scan result and tick the checkbox next to the CVE-2017-8464.exe file. Do not check any other file for removal unless you are 100% sure you want to delete it. Tip: Press CTRL-F to open up FreeFixer's search dialog to quickly locate CVE-2017-8464.exe in the scan result.
    Red arrow point on the unwanted file
    c:\downloads\CVE-2017-8464.exe
  3. Scroll down to the bottom of the scan result and press the Fix button. FreeFixer will now delete the CVE-2017-8464.exe file.
    Screenshot of Fix button
  4. Restart your computer.
  5. Start FreeFixer and scan your computer again. If CVE-2017-8464.exe still remains in the scan result, proceed with the next step. If CVE-2017-8464.exe is gone from the scan result you're done.
  6. If CVE-2017-8464.exe still remains in the scan result, check its checkbox again in the scan result and click Fix.
  7. Restart your computer.
  8. Start FreeFixer and scan your computer again. Verify that CVE-2017-8464.exe no longer appear in the scan result.
Please select the option that best describe your thoughts on the removal instructions given above








Hashes [?]

PropertyValue
MD58ddeb455ec4d03fa4876889f9e3df67a
SHA25629de263f0ef78fa757098df11c2d872525955c3da3c79e7e38e81daab0cfe1aa

Error Messages

These are some of the error messages that can appear related to cve-2017-8464.exe:

cve-2017-8464.exe has encountered a problem and needs to close. We are sorry for the inconvenience.

cve-2017-8464.exe - Application Error. The instruction at "0xXXXXXXXX" referenced memory at "0xXXXXXXXX". The memory could not be "read/written". Click on OK to terminate the program.

cve-2017-8464.exe has stopped working.

End Program - cve-2017-8464.exe. This program is not responding.

cve-2017-8464.exe is not a valid Win32 application.

cve-2017-8464.exe - Application Error. The application failed to initialize properly (0xXXXXXXXX). Click OK to terminate the application.

What will you do with the file?

To help other users, please let us know what you will do with the file:



Comments

Please share with the other users what you think about this file. What does this file do? Is it legitimate or something that your computer is better without? Do you know how it was installed on your system? Did you install it yourself or did it come bundled with some other software? Is it running smoothly or do you get some error message? Any information that will help to document this file is welcome. Thank you for your contributions.

I'm reading all new comments so don't hesitate to post a question about the file. If I don't have the answer perhaps another user can help you.

No comments posted yet.

Leave a reply