for iPhone@1580_192570.exe is part of ?????.exe according to the for iPhone@1580_192570.exe version information.
for iPhone@1580_192570.exe's description is "?????"
for iPhone@1580_192570.exe is digitally signed by Anhui Honour Network Technology Co., Ltd..
for iPhone@1580_192570.exe is usually located in the 'c:\downloads\' folder.
Some of the anti-virus scanners at VirusTotal detected for iPhone@1580_192570.exe.
If you have additional information about the file, please share it with the FreeFixer users by posting a comment at the bottom of this page.
The following is the available information on for iPhone@1580_192570.exe:
Property | Value |
---|---|
Product name | ?????.exe |
File description | ????? |
Internal name | ?????.exe |
Original filename | ?????.exe |
Legal copyright | Copyright (C) 2018 |
Product version | 3.2.19.226 |
File version | 3.2.19.226 |
Here's a screenshot of the file properties when displayed by Windows Explorer:
Product name | ?????.exe |
File description | ????? |
Internal name | ?????.exe |
Original filename | ?????.exe |
Legal copyright | Copyright (C) 2018 |
Product version | 3.2.19.226 |
File version | 3.2.19.226 |
for iPhone@1580_192570.exe has a valid digital signature.
Property | Value |
---|---|
Signer name | Anhui Honour Network Technology Co., Ltd. |
Certificate issuer name | VeriSign Class 3 Code Signing 2010 CA |
Certificate serial number | 68b9ceb50162a9c2144502b647d1ce59 |
47 of the 67 anti-virus programs at VirusTotal detected the for iPhone@1580_192570.exe file. That's a 70% detection rate.
Scanner | Detection Name |
---|---|
Ad-Aware | Gen:Variant.Adware.Razy.251612 |
AhnLab-V3 | PUP/Win32.Generic.R261350 |
ALYac | Gen:Variant.Adware.Razy.251612 |
Antiy-AVL | GrayWare/Win32.Qjwmonkey |
Arcabit | Trojan.Adware.Razy.D3D6DC |
Avast | Win32:Adware-gen [Adw] |
AVG | Win32:Adware-gen [Adw] |
Avira | ADWARE/AD.Qjwmonkey.ejnsf |
BitDefender | Gen:Variant.Adware.Razy.251612 |
CAT-QuickHeal | Trojan.Qjwmonkey |
Comodo | Application.Win32.AdWare.Qjwmonkey.H@7pvzrs |
CrowdStrike | win/malicious_confidence_60% (D) |
Cybereason | malicious.6d983a |
Cyren | W32/Adware.MCKL-7890 |
DrWeb | Adware.Qjwmonkey.153 |
eGambit | Unsafe.AI_Score_77% |
Emsisoft | Gen:Variant.Adware.Razy.251612 (B) |
Endgame | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Adware.Qjwmonkey.H |
F-Secure | Adware.ADWARE/AD.Qjwmonkey |
FireEye | Generic.mg.bc673a66d983a116 |
Fortinet | W32/Qjwmonkey.RXG!tr |
GData | Gen:Variant.Adware.Razy.251612 |
Ikarus | PUA.Qjwmonkey |
Invincea | heuristic |
Jiangmin | Downloader.Generic.akuh |
K7AntiVirus | Adware ( 005105151 ) |
K7GW | Adware ( 005105151 ) |
Kaspersky | not-a-virus:HEUR:Downloader.Win32.Generic |
Malwarebytes | Trojan.MalPack.PS |
MAX | malware (ai score=99) |
McAfee | Artemis!BC673A66D983 |
McAfee-GW-Edition | Artemis!PUP |
Microsoft | PUA:Win32/Qjwmonkey |
MicroWorld-eScan | Gen:Variant.Adware.Razy.251612 |
NANO-Antivirus | Trojan.Win32.Qjwmonkey.fochmm |
Paloalto | generic.ml |
Panda | Trj/Genetic.gen |
Rising | Trojan.Generic!1.B5B0 (CLOUD) |
SentinelOne | DFI - Malicious PE |
Sophos | QjMonkey (PUA) |
TrendMicro-HouseCall | TROJ_GEN.R020C0GCS19 |
VBA32 | BScope.Adware.Qjwmonkey |
ViRobot | Adware.Qjwmonkey.1354160.A |
Yandex | PUA.Downloader! |
Zillya | Adware.Qjwmonkey.Win32.492 |
ZoneAlarm | not-a-virus:HEUR:Downloader.Win32.Generic |
The following information was gathered by executing the file inside Cuckoo Sandbox.
Successfully executed process in sandbox.
{ "file_created": [ "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db" ], "regkey_written": [ "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableFileTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\MaxFileSize", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileDirectory", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableConsoleTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\ConsoleTracingMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileTracingMask" ], "dll_loaded": [ "urlmon.dll", "DNSAPI.dll", "kernel32.dll", "dwmapi.dll", "C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\\gdiplus.dll", "cryptsp.dll", "winhttp.dll", "C:\\Windows\\system32\\secur32.dll", "API-MS-WIN-Service-Management-L1-1-0.dll", "WININET.dll", "SspiCli.dll", "SHLWAPI.dll", "credssp.dll", "API-MS-WIN-Service-winsvc-L1-1-0.dll", "rtutils.dll", "WINTRUST.dll", "WindowsCodecs.dll", "RPCRT4.dll", "C:\\Windows\\System32\\wship6.dll", "C:\\Windows\\system32\\iphlpapi.dll", "C:\\Windows\\system32\\mswsock.dll", "ADVAPI32.dll", "rpcrt4.dll", "C:\\Windows\\System32\\wshtcpip.dll", "WS2_32.dll" ], "file_opened": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "C:\\Windows\\Fonts\\staticcache.dat", "\\??\\PhysicalDrive0" ], "regkey_opened": [ "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\LsaExtensionConfig\\SspiCli", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings", "HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows NT\\Rpc", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}\\{EF381EA0-4D07-418D-A490-68AF67CE948B}\\Connection", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Video\\{6FABAC3A-B3E4-4C2F-82E9-AA53D01C5093}\\0000", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\Tcpip\\Parameters\\Winsock", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Shell.Explorer\\CLSID", "HKEY_CLASSES_ROOT\\FirefoxURL-E7CF176E110C211B\\shell\\open\\command\\", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\SecurityProviders", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontLink\\SystemLink", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip6", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing\\RASAPI32", "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Winsock\\Setup Migration\\Providers", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Rpc", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\SecurityProviders\\SaslProfiles", "HKEY_LOCAL_MACHINE\\System\\Setup", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback", "HKEY_CLASSES_ROOT\\CLSID\\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\\Instance\\Disabled", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Shell\\Associations\\UrlAssociations\\http\\UserChoice\\", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\Tracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun", "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\LowRegistry", "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Winsock\\Parameters", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\DirectDraw\\GammaCalibrator", "HKEY_CURRENT_USER\\Shell.Explorer", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\msasn1", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion", "HKEY_CLASSES_ROOT\\CLSID\\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\\Instance", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\Tcpip6\\Parameters\\Winsock", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Lsa\\SspiCache", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0" ], "resolves_host": [ "x.93ne.com" ], "file_written": [ "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db" ], "regkey_deleted": [ "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\LowRegistry\\AddToFeedsInitialSelection", "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\LowRegistry\\AddToFavoritesInitialSelection" ], "file_exists": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin" ], "mutex": [ "Local\\__DDrawExclMode__", "ATL:MemData03EACUCKPC", "Local\\__DDrawCheckExclMode__" ], "file_failed": [ "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db" ], "guid": [ "{8856f961-340a-11d0-a96b-00c04fd705a2}", "{00000000-0000-0000-c000-000000000046}" ], "file_read": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "C:\\Windows\\Fonts\\staticcache.dat" ], "regkey_read": [ "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\TokenSize", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\UseDelayedAcceptance", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane1", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane8", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Rpc\\MaxRpcSize", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane5", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Shell\\Associations\\UrlAssociations\\http\\UserChoice\\Progid", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Capabilities", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\InstallDate", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Shell.Explorer\\CLSID\\(Default)", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\UseDelayedAcceptance", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0\\DataFilePath", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\LsaExtensionConfig\\SspiCli\\CheckSignatureRoutine", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableConsoleTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane9", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\Drivers\\SoftwareOnly", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane15", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\Mapping", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\SecurityProviders\\SecurityProviders", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane7", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\MinSockaddrLength", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane13", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane2", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip\\WinSock 2.0 Provider ID", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ShareCredsWithWinHttp", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane1", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane11", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\Tracing\\Enabled", "HKEY_LOCAL_MACHINE\\SYSTEM\\Setup\\SystemSetupInProgress", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane2", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane8", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0\\Disable", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\GRE_Initialize\\DisableMetaFiles", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\MinSockaddrLength", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane6", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\LsaExtensionConfig\\SspiCli\\CheckSignatureDll", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileDirectory", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane9", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\EnableConsoleTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane7", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane4", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane5", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\LoadDebugRuntime", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane3", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileTracingMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane6", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\Mapping", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Comment", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Name", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\MaxFileSize", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane4", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane16", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Language Groups\\1", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\DisableBranchCache", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\SQMClient\\Windows\\CEIPEnable", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Version", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane10", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\MaxSockaddrLength", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane12", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}\\{EF381EA0-4D07-418D-A490-68AF67CE948B}\\Connection\\MediaSubType", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane14", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\ComputerName\\ActiveComputerName\\ComputerName", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane16", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane3", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\MaxSockaddrLength", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableFileTracing", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Locale\\00000409", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\HelperDllName", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\HelperDllName", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip6\\WinSock 2.0 Provider ID", "HKEY_LOCAL_MACHINE\\SYSTEM\\Setup\\OOBEInProgress", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane15", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane11", "HKEY_CURRENT_USER\\FirefoxURL-E7CF176E110C211B\\shell\\open\\command\\(Default)", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Parameters\\Transports", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\ForceDriverFlagsOff", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane14", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\RpcId", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Type", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Video\\{6FABAC3A-B3E4-4C2F-82E9-AA53D01C5093}\\0000\\InstalledDisplayDrivers", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane10", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\ConsoleTracingMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane12", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane13" ] }
[ { "yara": [], "sha1": "fde8eef8b2254a474ff7ea04e0642039805d9b0a", "name": "da8c1150075f581b_globalmgr.db", "filepath": "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db", "type": "ASCII text, with CRLF line terminators", "sha256": "da8c1150075f581b315515290ca8b9d5d18ff897162887a5620669cd92ae7b77", "urls": [], "crc32": "C29EDCC0", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/6106\/files\/da8c1150075f581b_globalmgr.db", "ssdeep": null, "size": 190, "sha512": "1c72f4402a76a88e615f2c16ab9251794e8d4d9a73b3503033cadabcb428e0b196ddccd662c1df73d854bedeec93aeab55e0368f4ab6e85c37c875535c88723b", "pids": [ 2800 ], "md5": "b2305cb44a0de0d0aa30986c80949a48" } ]
[ { "process_path": "C:\\Users\\cuck\\AppData\\Local\\Temp\\fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "process_name": "fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "pid": 2800, "summary": { "file_created": [ "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db" ], "regkey_written": [ "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableFileTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\MaxFileSize", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileDirectory", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableConsoleTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\ConsoleTracingMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileTracingMask" ], "dll_loaded": [ "urlmon.dll", "DNSAPI.dll", "kernel32.dll", "dwmapi.dll", "C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\\gdiplus.dll", "cryptsp.dll", "winhttp.dll", "C:\\Windows\\system32\\secur32.dll", "API-MS-WIN-Service-Management-L1-1-0.dll", "WININET.dll", "SspiCli.dll", "SHLWAPI.dll", "credssp.dll", "API-MS-WIN-Service-winsvc-L1-1-0.dll", "rtutils.dll", "WINTRUST.dll", "WindowsCodecs.dll", "RPCRT4.dll", "C:\\Windows\\System32\\wship6.dll", "C:\\Windows\\system32\\iphlpapi.dll", "C:\\Windows\\system32\\mswsock.dll", "ADVAPI32.dll", "rpcrt4.dll", "C:\\Windows\\System32\\wshtcpip.dll", "WS2_32.dll" ], "file_opened": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "C:\\Windows\\Fonts\\staticcache.dat", "\\??\\PhysicalDrive0" ], "regkey_opened": [ "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\LsaExtensionConfig\\SspiCli", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings", "HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows NT\\Rpc", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}\\{EF381EA0-4D07-418D-A490-68AF67CE948B}\\Connection", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Video\\{6FABAC3A-B3E4-4C2F-82E9-AA53D01C5093}\\0000", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\Tcpip\\Parameters\\Winsock", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Shell.Explorer\\CLSID", "HKEY_CLASSES_ROOT\\FirefoxURL-E7CF176E110C211B\\shell\\open\\command\\", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\SecurityProviders", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontLink\\SystemLink", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip6", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing\\RASAPI32", "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Winsock\\Setup Migration\\Providers", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Rpc", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\SecurityProviders\\SaslProfiles", "HKEY_LOCAL_MACHINE\\System\\Setup", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback", "HKEY_CLASSES_ROOT\\CLSID\\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\\Instance\\Disabled", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Shell\\Associations\\UrlAssociations\\http\\UserChoice\\", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\Tracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun", "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\LowRegistry", "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Winsock\\Parameters", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\DirectDraw\\GammaCalibrator", "HKEY_CURRENT_USER\\Shell.Explorer", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\msasn1", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion", "HKEY_CLASSES_ROOT\\CLSID\\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\\Instance", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\Tcpip6\\Parameters\\Winsock", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Lsa\\SspiCache", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0" ], "resolves_host": [ "x.93ne.com" ], "file_written": [ "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db" ], "regkey_deleted": [ "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\LowRegistry\\AddToFeedsInitialSelection", "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\LowRegistry\\AddToFavoritesInitialSelection" ], "file_exists": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin" ], "mutex": [ "Local\\__DDrawExclMode__", "ATL:MemData03EACUCKPC", "Local\\__DDrawCheckExclMode__" ], "file_failed": [ "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db" ], "guid": [ "{8856f961-340a-11d0-a96b-00c04fd705a2}", "{00000000-0000-0000-c000-000000000046}" ], "file_read": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "C:\\Windows\\Fonts\\staticcache.dat" ], "regkey_read": [ "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\TokenSize", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\UseDelayedAcceptance", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane1", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane8", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Rpc\\MaxRpcSize", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane5", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Shell\\Associations\\UrlAssociations\\http\\UserChoice\\Progid", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Capabilities", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\InstallDate", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Shell.Explorer\\CLSID\\(Default)", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\UseDelayedAcceptance", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0\\DataFilePath", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\LsaExtensionConfig\\SspiCli\\CheckSignatureRoutine", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableConsoleTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane9", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\Drivers\\SoftwareOnly", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane15", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\Mapping", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\SecurityProviders\\SecurityProviders", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane7", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\MinSockaddrLength", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane13", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane2", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip\\WinSock 2.0 Provider ID", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ShareCredsWithWinHttp", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane1", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane11", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\Tracing\\Enabled", "HKEY_LOCAL_MACHINE\\SYSTEM\\Setup\\SystemSetupInProgress", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane2", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane8", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0\\Disable", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\GRE_Initialize\\DisableMetaFiles", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\MinSockaddrLength", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane6", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\LsaExtensionConfig\\SspiCli\\CheckSignatureDll", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileDirectory", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane9", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\EnableConsoleTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane7", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane4", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane5", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\LoadDebugRuntime", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane3", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileTracingMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane6", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\Mapping", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Comment", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Name", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\MaxFileSize", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane4", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane16", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Language Groups\\1", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\DisableBranchCache", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\SQMClient\\Windows\\CEIPEnable", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Version", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane10", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\MaxSockaddrLength", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane12", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}\\{EF381EA0-4D07-418D-A490-68AF67CE948B}\\Connection\\MediaSubType", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane14", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\ComputerName\\ActiveComputerName\\ComputerName", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane16", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane3", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\MaxSockaddrLength", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableFileTracing", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Locale\\00000409", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\HelperDllName", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\HelperDllName", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip6\\WinSock 2.0 Provider ID", "HKEY_LOCAL_MACHINE\\SYSTEM\\Setup\\OOBEInProgress", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane15", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane11", "HKEY_CURRENT_USER\\FirefoxURL-E7CF176E110C211B\\shell\\open\\command\\(Default)", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Parameters\\Transports", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\ForceDriverFlagsOff", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane14", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\RpcId", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Type", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Video\\{6FABAC3A-B3E4-4C2F-82E9-AA53D01C5093}\\0000\\InstalledDisplayDrivers", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane10", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\ConsoleTracingMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane12", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane13" ] }, "first_seen": 1584276785.780874, "ppid": 3040 }, { "process_path": "C:\\Windows\\System32\\lsass.exe", "process_name": "lsass.exe", "pid": 476, "summary": {}, "first_seen": 1584276785.3125, "ppid": 376 } ]
[ { "markcount": 1, "families": [], "description": "Queries for the computername", "severity": 1, "marks": [ { "call": { "category": "misc", "status": 1, "stacktrace": [], "api": "GetComputerNameW", "return_value": 1, "arguments": { "computer_name": "CUCKPC" }, "time": 1584276786.061874, "tid": 2816, "flags": {} }, "pid": 2800, "type": "call", "cid": 395 } ], "references": [], "name": "antivm_queries_computername" }, { "markcount": 1, "families": [], "description": "Checks if process is being debugged by a debugger", "severity": 1, "marks": [ { "call": { "category": "system", "status": 0, "stacktrace": [], "last_error": 0, "nt_status": -1073741568, "api": "IsDebuggerPresent", "return_value": 0, "arguments": {}, "time": 1584276786.061874, "tid": 2816, "flags": {} }, "pid": 2800, "type": "call", "cid": 399 } ], "references": [], "name": "checks_debugger" }, { "markcount": 1, "families": [], "description": "Collects information to fingerprint the system (MachineGuid, DigitalProductId, SystemBiosDate)", "severity": 1, "marks": [ { "category": "registry", "ioc": "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\InstallDate", "type": "ioc", "description": null } ], "references": [], "name": "recon_fingerprint" }, { "markcount": 1, "families": [], "description": "This executable has a PDB path", "severity": 1, "marks": [ { "category": "pdb_path", "ioc": "E:\\BZ\\BZClient\\Output\\Release\\BZDownload.pdb", "type": "ioc", "description": null } ], "references": [], "name": "has_pdb" }, { "markcount": 1, "families": [], "description": "Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available", "severity": 1, "marks": [ { "call": { "category": "system", "status": 1, "stacktrace": [], "api": "GlobalMemoryStatusEx", "return_value": 1, "arguments": {}, "time": 1584276786.061874, "tid": 2816, "flags": {} }, "pid": 2800, "type": "call", "cid": 422 } ], "references": [], "name": "antivm_memory_available" }, { "markcount": 3, "families": [], "description": "The executable contains unknown PE section names indicative of a packer (could be a false positive)", "severity": 1, "marks": [ { "category": "section", "ioc": ".dtd", "type": "ioc", "description": null }, { "category": "section", "ioc": ".dtc", "type": "ioc", "description": null }, { "category": "section", "ioc": ".phx", "type": "ioc", "description": null } ], "references": [], "name": "pe_features" }, { "markcount": 1, "families": [], "description": "The file contains an unknown PE resource name possibly indicative of a packer", "severity": 1, "marks": [ { "category": "resource name", "ioc": "PNG", "type": "ioc", "description": null } ], "references": [], "name": "pe_unknown_resource_name" }, { "markcount": 1, "families": [], "description": "One or more processes crashed", "severity": 1, "marks": [ { "call": { "category": "__notification__", "status": 1, "stacktrace": [], "raw": [ "stacktrace" ], "api": "__exception__", "return_value": 0, "arguments": { "stacktrace": "f\ne\n2\nf\n3\n7\n6\n2\n3\nb\n8\n2\n6\n6\n9\n9\na\nb\n0\n0\nc\nc\na\nc\n6\nd\n5\n0\nf\n9\n6\n7\n6\n3\na\na\nb\n6\n1\n2\nd\n0\n7\ne\n3\n1\nf\n9\nd\ne\n7\n3\n6\n2\n9\n2\n0\n9\n7\n2\n1\n2\nc\nc\n+\n0\nx\n2\n5\n0\n7\nb\n \n@\n \n0\nx\nd\n8\n5\n0\n7\nb\n\n\nf\ne\n2\nf\n3\n7\n6\n2\n3\nb\n8\n2\n6\n6\n9\n9\na\nb\n0\n0\nc\nc\na\nc\n6\nd\n5\n0\nf\n9\n6\n7\n6\n3\na\na\nb\n6\n1\n2\nd\n0\n7\ne\n3\n1\nf\n9\nd\ne\n7\n3\n6\n2\n9\n2\n0\n9\n7\n2\n1\n2\nc\nc\n+\n0\nx\n8\nd\n3\nc\n \n@\n \n0\nx\nd\n6\n8\nd\n3\nc\n\n\nf\ne\n2\nf\n3\n7\n6\n2\n3\nb\n8\n2\n6\n6\n9\n9\na\nb\n0\n0\nc\nc\na\nc\n6\nd\n5\n0\nf\n9\n6\n7\n6\n3\na\na\nb\n6\n1\n2\nd\n0\n7\ne\n3\n1\nf\n9\nd\ne\n7\n3\n6\n2\n9\n2\n0\n9\n7\n2\n1\n2\nc\nc\n+\n0\nx\n1\nc\n4\n6\n \n@\n \n0\nx\nd\n6\n1\nc\n4\n6\n\n\nf\ne\n2\nf\n3\n7\n6\n2\n3\nb\n8\n2\n6\n6\n9\n9\na\nb\n0\n0\nc\nc\na\nc\n6\nd\n5\n0\nf\n9\n6\n7\n6\n3\na\na\nb\n6\n1\n2\nd\n0\n7\ne\n3\n1\nf\n9\nd\ne\n7\n3\n6\n2\n9\n2\n0\n9\n7\n2\n1\n2\nc\nc\n+\n0\nx\nc\nc\n9\n6\na\n \n@\n \n0\nx\ne\n2\nc\n9\n6\na\n\n\nB\na\ns\ne\nT\nh\nr\ne\na\nd\nI\nn\ni\nt\nT\nh\nu\nn\nk\n+\n0\nx\n1\n2\n \nV\ne\nr\ni\nf\ny\nC\no\nn\ns\no\nl\ne\nI\no\nH\na\nn\nd\nl\ne\n-\n0\nx\nb\n3\n \nk\ne\nr\nn\ne\nl\n3\n2\n+\n0\nx\n1\n3\n3\nc\na\n \n@\n \n0\nx\n7\n5\nb\nc\n3\n3\nc\na\n\n\nR\nt\nl\nI\nn\ni\nt\ni\na\nl\ni\nz\ne\nE\nx\nc\ne\np\nt\ni\no\nn\nC\nh\na\ni\nn\n+\n0\nx\n6\n3\n \nR\nt\nl\nA\nl\nl\no\nc\na\nt\ne\nA\nc\nt\ni\nv\na\nt\ni\no\nn\nC\no\nn\nt\ne\nx\nt\nS\nt\na\nc\nk\n-\n0\nx\na\n1\n \nn\nt\nd\nl\nl\n+\n0\nx\n3\n9\ne\nd\n2\n \n@\n \n0\nx\n7\n7\nb\nc\n9\ne\nd\n2\n\n\nR\nt\nl\nI\nn\ni\nt\ni\na\nl\ni\nz\ne\nE\nx\nc\ne\np\nt\ni\no\nn\nC\nh\na\ni\nn\n+\n0\nx\n3\n6\n \nR\nt\nl\nA\nl\nl\no\nc\na\nt\ne\nA\nc\nt\ni\nv\na\nt\ni\no\nn\nC\no\nn\nt\ne\nx\nt\nS\nt\na\nc\nk\n-\n0\nx\nc\ne\n \nn\nt\nd\nl\nl\n+\n0\nx\n3\n9\ne\na\n5\n \n@\n \n0\nx\n7\n7\nb\nc\n9\ne\na\n5", "registers": { "esp": 4583276, "edi": 5601056, "eax": 1447909480, "ebp": 4583332, "edx": 22104, "ebx": 0, "esi": 5668736, "ecx": 10 }, "exception": { "instruction_r": "ed 81 fb 68 58 4d 56 0f 94 45 e4 5b 59 5a c7 45", "symbol": "fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc+0x30b38", "instruction": "in eax, dx", "module": "fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "exception_code": "0xc0000096", "offset": 199480, "address": "0xd90b38" } }, "time": 1584276786.092874, "tid": 2816, "flags": {} }, "pid": 2800, "type": "call", "cid": 453 } ], "references": [], "name": "raises_exception" }, { "markcount": 4, "families": [], "description": "Allocates read-write-execute memory (usually to unpack itself)", "severity": 2, "marks": [ { "call": { "category": "process", "status": 1, "stacktrace": [], "api": "NtAllocateVirtualMemory", "return_value": 0, "arguments": { "process_identifier": 2800, "region_size": 65536, "stack_dep_bypass": 0, "stack_pivoted": 0, "heap_dep_bypass": 1, "protection": 64, "process_handle": "0xffffffff", "allocation_type": 12288, "base_address": "0x6dbb0000" }, "time": 1584276786.217874, "tid": 2816, "flags": { "protection": "PAGE_EXECUTE_READWRITE", "allocation_type": "MEM_COMMIT|MEM_RESERVE" } }, "pid": 2800, "type": "call", "cid": 935 }, { "call": { "category": "process", "status": 1, "stacktrace": [], "api": "NtProtectVirtualMemory", "return_value": 0, "arguments": { "process_identifier": 2800, "stack_dep_bypass": 0, "stack_pivoted": 0, "heap_dep_bypass": 0, "length": 4096, "protection": 64, "process_handle": "0xffffffff", "base_address": "0x75bc7000" }, "time": 1584276786.217874, "tid": 2816, "flags": { "protection": "PAGE_EXECUTE_READWRITE" } }, "pid": 2800, "type": "call", "cid": 936 }, { "call": { "category": "process", "status": 1, "stacktrace": [], "api": "NtProtectVirtualMemory", "return_value": 0, "arguments": { "process_identifier": 2800, "stack_dep_bypass": 0, "stack_pivoted": 0, "heap_dep_bypass": 1, "length": 65536, "protection": 64, "process_handle": "0xffffffff", "base_address": "0x6dbb0000" }, "time": 1584276819.030874, "tid": 2816, "flags": { "protection": "PAGE_EXECUTE_READWRITE" } }, "pid": 2800, "type": "call", "cid": 1604 }, { "call": { "category": "process", "status": 1, "stacktrace": [], "api": "NtProtectVirtualMemory", "return_value": 0, "arguments": { "process_identifier": 2800, "stack_dep_bypass": 0, "stack_pivoted": 0, "heap_dep_bypass": 0, "length": 4096, "protection": 64, "process_handle": "0xffffffff", "base_address": "0x75bc7000" }, "time": 1584276819.030874, "tid": 2816, "flags": { "protection": "PAGE_EXECUTE_READWRITE" } }, "pid": 2800, "type": "call", "cid": 1605 } ], "references": [], "name": "allocates_rwx" }, { "markcount": 11, "families": [], "description": "Foreign language identified in PE resource", "severity": 2, "marks": [ { "name": "PNG", "language": "LANG_CHINESE", "offset": "0x00136d70", "filetype": "PNG image data, 260 x 180, 8-bit\/color RGBA, non-interlaced", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x0000bc26" }, { "name": "RT_ICON", "language": "LANG_CHINESE", "offset": "0x00136608", "filetype": "GLS_BINARY_LSB_FIRST", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000468" }, { "name": "RT_ICON", "language": "LANG_CHINESE", "offset": "0x00136608", "filetype": "GLS_BINARY_LSB_FIRST", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000468" }, { "name": "RT_ICON", "language": "LANG_CHINESE", "offset": "0x00136608", "filetype": "GLS_BINARY_LSB_FIRST", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000468" }, { "name": "RT_ICON", "language": "LANG_CHINESE", "offset": "0x00136608", "filetype": "GLS_BINARY_LSB_FIRST", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000468" }, { "name": "RT_ICON", "language": "LANG_CHINESE", "offset": "0x00136608", "filetype": "GLS_BINARY_LSB_FIRST", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000468" }, { "name": "RT_ICON", "language": "LANG_CHINESE", "offset": "0x00136608", "filetype": "GLS_BINARY_LSB_FIRST", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000468" }, { "name": "RT_MENU", "language": "LANG_CHINESE", "offset": "0x00136ad0", "filetype": "data", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000026" }, { "name": "RT_STRING", "language": "LANG_CHINESE", "offset": "0x00142998", "filetype": "data", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000048" }, { "name": "RT_GROUP_ICON", "language": "LANG_CHINESE", "offset": "0x00136a70", "filetype": "MS Windows icon resource - 6 icons, 48x48", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x0000005a" }, { "name": "RT_VERSION", "language": "LANG_CHINESE", "offset": "0x00136af8", "filetype": "data", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000274" } ], "references": [], "name": "origin_langid" }, { "markcount": 1, "families": [], "description": "The binary likely contains encrypted or compressed data indicative of a packer", "severity": 2, "marks": [ { "entropy": 7.179044609742362, "section": { "size_of_data": "0x00011c00", "virtual_address": "0x00131000", "entropy": 7.179044609742362, "name": ".rsrc", "virtual_size": "0x00011b68" }, "type": "generic", "description": "A section with a high entropy has been found" } ], "references": [ "http:\/\/www.forensickb.com\/2013\/03\/file-entropy-explained.html", "http:\/\/virii.es\/U\/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf" ], "name": "packer_entropy" }, { "markcount": 10, "families": [], "description": "Repeatedly searches for a not-found process, you may want to run a web browser during analysis", "severity": 2, "marks": [ { "call": { "category": "process", "status": 0, "stacktrace": [], "last_error": 18, "nt_status": 0, "api": "Process32NextW", "return_value": 0, "arguments": { "process_name": "fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "snapshot_handle": "0x000001a8", "process_identifier": 2800 }, "time": 1584276786.170874, "tid": 2816, "flags": {} }, "pid": 2800, "type": "call", "cid": 515 }, { "call": { "category": "process", "status": 0, "stacktrace": [], "last_error": 18, "nt_status": 0, "api": "Process32NextW", "return_value": 0, "arguments": { "process_name": "fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "snapshot_handle": "0x000001a8", "process_identifier": 2800 }, "time": 1584276786.170874, "tid": 2816, "flags": {} }, "pid": 2800, "type": "call", "cid": 556 }, { "call": { "category": "process", "status": 0, "stacktrace": [], "last_error": 18, "nt_status": 0, "api": "Process32NextW", "return_value": 0, "arguments": { "process_name": "fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "snapshot_handle": "0x000001a8", "process_identifier": 2800 }, "time": 1584276786.186874, "tid": 2816, "flags": {} }, "pid": 2800, "type": "call", "cid": 597 }, { "call": { "category": "process", "status": 0, "stacktrace": [], "last_error": 18, "nt_status": 0, "api": "Process32NextW", "return_value": 0, "arguments": { "process_name": "fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "snapshot_handle": "0x000001a8", "process_identifier": 2800 }, "time": 1584276786.186874, "tid": 2816, "flags": {} }, "pid": 2800, "type": "call", "cid": 638 }, { "call": { "category": "process", "status": 0, "stacktrace": [], "last_error": 18, "nt_status": 0, "api": "Process32NextW", "return_value": 0, "arguments": { "process_name": "fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "snapshot_handle": "0x000001a8", "process_identifier": 2800 }, "time": 1584276786.186874, "tid": 2816, "flags": {} }, "pid": 2800, "type": "call", "cid": 679 }, { "call": { "category": "process", "status": 0, "stacktrace": [], "last_error": 18, "nt_status": 0, "api": "Process32NextW", "return_value": 0, "arguments": { "process_name": "fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "snapshot_handle": "0x000001a8", "process_identifier": 2800 }, "time": 1584276786.201874, "tid": 2816, "flags": {} }, "pid": 2800, "type": "call", "cid": 720 }, { "call": { "category": "process", "status": 0, "stacktrace": [], "last_error": 18, "nt_status": 0, "api": "Process32NextW", "return_value": 0, "arguments": { "process_name": "fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "snapshot_handle": "0x000001a8", "process_identifier": 2800 }, "time": 1584276786.201874, "tid": 2816, "flags": {} }, "pid": 2800, "type": "call", "cid": 761 }, { "call": { "category": "process", "status": 0, "stacktrace": [], "last_error": 18, "nt_status": 0, "api": "Process32NextW", "return_value": 0, "arguments": { "process_name": "fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "snapshot_handle": "0x000001a8", "process_identifier": 2800 }, "time": 1584276786.201874, "tid": 2816, "flags": {} }, "pid": 2800, "type": "call", "cid": 802 }, { "call": { "category": "process", "status": 0, "stacktrace": [], "last_error": 18, "nt_status": 0, "api": "Process32NextW", "return_value": 0, "arguments": { "process_name": "fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "snapshot_handle": "0x000001a8", "process_identifier": 2800 }, "time": 1584276786.201874, "tid": 2816, "flags": {} }, "pid": 2800, "type": "call", "cid": 843 }, { "call": { "category": "process", "status": 0, "stacktrace": [], "last_error": 18, "nt_status": 0, "api": "Process32NextW", "return_value": 0, "arguments": { "process_name": "fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "snapshot_handle": "0x000001a8", "process_identifier": 2800 }, "time": 1584276786.201874, "tid": 2816, "flags": {} }, "pid": 2800, "type": "call", "cid": 884 } ], "references": [], "name": "process_needed" }, { "markcount": 1, "families": [], "description": "Detects VMWare through the in instruction feature", "severity": 3, "marks": [ { "call": { "category": "__notification__", "status": 1, "stacktrace": [], "raw": [ "stacktrace" ], "api": "__exception__", "return_value": 0, "arguments": { "stacktrace": "f\ne\n2\nf\n3\n7\n6\n2\n3\nb\n8\n2\n6\n6\n9\n9\na\nb\n0\n0\nc\nc\na\nc\n6\nd\n5\n0\nf\n9\n6\n7\n6\n3\na\na\nb\n6\n1\n2\nd\n0\n7\ne\n3\n1\nf\n9\nd\ne\n7\n3\n6\n2\n9\n2\n0\n9\n7\n2\n1\n2\nc\nc\n+\n0\nx\n2\n5\n0\n7\nb\n \n@\n \n0\nx\nd\n8\n5\n0\n7\nb\n\n\nf\ne\n2\nf\n3\n7\n6\n2\n3\nb\n8\n2\n6\n6\n9\n9\na\nb\n0\n0\nc\nc\na\nc\n6\nd\n5\n0\nf\n9\n6\n7\n6\n3\na\na\nb\n6\n1\n2\nd\n0\n7\ne\n3\n1\nf\n9\nd\ne\n7\n3\n6\n2\n9\n2\n0\n9\n7\n2\n1\n2\nc\nc\n+\n0\nx\n8\nd\n3\nc\n \n@\n \n0\nx\nd\n6\n8\nd\n3\nc\n\n\nf\ne\n2\nf\n3\n7\n6\n2\n3\nb\n8\n2\n6\n6\n9\n9\na\nb\n0\n0\nc\nc\na\nc\n6\nd\n5\n0\nf\n9\n6\n7\n6\n3\na\na\nb\n6\n1\n2\nd\n0\n7\ne\n3\n1\nf\n9\nd\ne\n7\n3\n6\n2\n9\n2\n0\n9\n7\n2\n1\n2\nc\nc\n+\n0\nx\n1\nc\n4\n6\n \n@\n \n0\nx\nd\n6\n1\nc\n4\n6\n\n\nf\ne\n2\nf\n3\n7\n6\n2\n3\nb\n8\n2\n6\n6\n9\n9\na\nb\n0\n0\nc\nc\na\nc\n6\nd\n5\n0\nf\n9\n6\n7\n6\n3\na\na\nb\n6\n1\n2\nd\n0\n7\ne\n3\n1\nf\n9\nd\ne\n7\n3\n6\n2\n9\n2\n0\n9\n7\n2\n1\n2\nc\nc\n+\n0\nx\nc\nc\n9\n6\na\n \n@\n \n0\nx\ne\n2\nc\n9\n6\na\n\n\nB\na\ns\ne\nT\nh\nr\ne\na\nd\nI\nn\ni\nt\nT\nh\nu\nn\nk\n+\n0\nx\n1\n2\n \nV\ne\nr\ni\nf\ny\nC\no\nn\ns\no\nl\ne\nI\no\nH\na\nn\nd\nl\ne\n-\n0\nx\nb\n3\n \nk\ne\nr\nn\ne\nl\n3\n2\n+\n0\nx\n1\n3\n3\nc\na\n \n@\n \n0\nx\n7\n5\nb\nc\n3\n3\nc\na\n\n\nR\nt\nl\nI\nn\ni\nt\ni\na\nl\ni\nz\ne\nE\nx\nc\ne\np\nt\ni\no\nn\nC\nh\na\ni\nn\n+\n0\nx\n6\n3\n \nR\nt\nl\nA\nl\nl\no\nc\na\nt\ne\nA\nc\nt\ni\nv\na\nt\ni\no\nn\nC\no\nn\nt\ne\nx\nt\nS\nt\na\nc\nk\n-\n0\nx\na\n1\n \nn\nt\nd\nl\nl\n+\n0\nx\n3\n9\ne\nd\n2\n \n@\n \n0\nx\n7\n7\nb\nc\n9\ne\nd\n2\n\n\nR\nt\nl\nI\nn\ni\nt\ni\na\nl\ni\nz\ne\nE\nx\nc\ne\np\nt\ni\no\nn\nC\nh\na\ni\nn\n+\n0\nx\n3\n6\n \nR\nt\nl\nA\nl\nl\no\nc\na\nt\ne\nA\nc\nt\ni\nv\na\nt\ni\no\nn\nC\no\nn\nt\ne\nx\nt\nS\nt\na\nc\nk\n-\n0\nx\nc\ne\n \nn\nt\nd\nl\nl\n+\n0\nx\n3\n9\ne\na\n5\n \n@\n \n0\nx\n7\n7\nb\nc\n9\ne\na\n5", "registers": { "esp": 4583276, "edi": 5601056, "eax": 1447909480, "ebp": 4583332, "edx": 22104, "ebx": 0, "esi": 5668736, "ecx": 10 }, "exception": { "instruction_r": "ed 81 fb 68 58 4d 56 0f 94 45 e4 5b 59 5a c7 45", "symbol": "fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc+0x30b38", "instruction": "in eax, dx", "module": "fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc.bin", "exception_code": "0xc0000096", "offset": 199480, "address": "0xd90b38" } }, "time": 1584276786.092874, "tid": 2816, "flags": {} }, "pid": 2800, "type": "call", "cid": 453 } ], "references": [], "name": "antivm_vmware_in_instruction" } ]
The Yara rules did not detect anything in the file.
{ "tls": [], "udp": [ { "src": "192.168.56.101", "dst": "192.168.56.255", "offset": 546, "time": 3.129986047744751, "dport": 137, "sport": 137 }, { "src": "192.168.56.101", "dst": "192.168.56.255", "offset": 13002, "time": 9.130461931228638, "dport": 138, "sport": 138 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 14846, "time": 3.0696818828582764, "dport": 5355, "sport": 51001 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 15174, "time": 1.0638790130615234, "dport": 5355, "sport": 53595 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 15502, "time": 3.088371992111206, "dport": 5355, "sport": 53848 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 15830, "time": 1.5379960536956787, "dport": 5355, "sport": 54255 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 16158, "time": -0.0361781120300293, "dport": 5355, "sport": 55314 }, { "src": "192.168.56.101", "dst": "239.255.255.250", "offset": 16486, "time": 1.5690770149230957, "dport": 1900, "sport": 1900 }, { "src": "192.168.56.101", "dst": "239.255.255.250", "offset": 35896, "time": 1.0756950378417969, "dport": 3702, "sport": 49152 }, { "src": "192.168.56.101", "dst": "239.255.255.250", "offset": 44280, "time": 3.1932308673858643, "dport": 1900, "sport": 53598 } ], "dns_servers": [], "http": [], "icmp": [], "smtp": [], "tcp": [], "smtp_ex": [], "mitm": [], "hosts": [], "pcap_sha256": "d88b310ddd4b1faea9acd1cd7251d2947266ee19d9e90a75651436f5990831fb", "dns": [], "http_ex": [], "domains": [], "dead_hosts": [], "sorted_pcap_sha256": "06a0eac192f107ef2a3b1adc99b2691f0507281daac589e230c2498820af3787", "irc": [], "https_ex": [] }
The instructions below shows how to remove for iPhone@1580_192570.exe with help from the FreeFixer removal tool. Basically, you install FreeFixer, scan your computer, check the for iPhone@1580_192570.exe file for removal, restart your computer and scan it again to verify that for iPhone@1580_192570.exe has been successfully removed. Here are the removal instructions in more detail:
for iPhone@1580_192570.exe may also use other filenames. The most common variants are listed below:
Property | Value |
---|---|
MD5 | bc673a66d983a1163982481040cb7cb3 |
SHA256 | fe2f37623b826699ab00ccac6d50f96763aab612d07e31f9de736292097212cc |
These are some of the error messages that can appear related to for iphone@1580_192570.exe:
for iphone@1580_192570.exe has encountered a problem and needs to close. We are sorry for the inconvenience.
for iphone@1580_192570.exe - Application Error. The instruction at "0xXXXXXXXX" referenced memory at "0xXXXXXXXX". The memory could not be "read/written". Click on OK to terminate the program.
????? has stopped working.
End Program - for iphone@1580_192570.exe. This program is not responding.
for iphone@1580_192570.exe is not a valid Win32 application.
for iphone@1580_192570.exe - Application Error. The application failed to initialize properly (0xXXXXXXXX). Click OK to terminate the application.
To help other users, please let us know what you will do with the file:
Please share with the other users what you think about this file. What does this file do? Is it legitimate or something that your computer is better without? Do you know how it was installed on your system? Did you install it yourself or did it come bundled with some other software? Is it running smoothly or do you get some error message? Any information that will help to document this file is welcome. Thank you for your contributions.
I'm reading all new comments so don't hesitate to post a question about the file. If I don't have the answer perhaps another user can help you.
No comments posted yet.