What is pandatxtool@2345_52472.exe?

pandatxtool@2345_52472.exe is part of ?????.exe according to the pandatxtool@2345_52472.exe version information.

pandatxtool@2345_52472.exe's description is "?????"

pandatxtool@2345_52472.exe is digitally signed by Anhui Changsu Network Technology Co., Ltd..

pandatxtool@2345_52472.exe is usually located in the 'c:\downloads\' folder.

Some of the anti-virus scanners at VirusTotal detected pandatxtool@2345_52472.exe.

If you have additional information about the file, please share it with the FreeFixer users by posting a comment at the bottom of this page.

Vendor and version information [?]

The following is the available information on pandatxtool@2345_52472.exe:

PropertyValue
Product name?????.exe
File description?????
Internal name?????.exe
Original filename?????.exe
Legal copyrightCopyright (C) 2018
Product version3.0.0.814
File version3.0.0.814

Here's a screenshot of the file properties when displayed by Windows Explorer:

Product name?????.exe
File description?????
Internal name?????.exe
Original filename?????.exe
Legal copyrightCopyright (C) 2018
Product version3.0.0.814
File version3.0.0.814

Digital signatures [?]

pandatxtool@2345_52472.exe has a valid digital signature.

PropertyValue
Signer nameAnhui Changsu Network Technology Co., Ltd.
Certificate issuer nameVeriSign Class 3 Code Signing 2010 CA
Certificate serial number7030f56ec53530726d57f6df5c476c8d

VirusTotal report

50 of the 68 anti-virus programs at VirusTotal detected the pandatxtool@2345_52472.exe file. That's a 74% detection rate.

ScannerDetection Name
Ad-Aware Trojan.GenericKD.31733399
AhnLab-V3 PUP/Win32.Qiwmonk.R249077
Alibaba AdWare:Win32/Qjwmonkey.983c7868
ALYac Trojan.GenericKD.31733399
Antiy-AVL RiskWare[Downloader]/Win32.Snojan
Arcabit Trojan.Generic.D1E43697
Avast Win32:Adware-gen [Adw]
AVG Win32:Adware-gen [Adw]
Avira ADWARE/Qjwmonkey.hgyuq
BitDefender Trojan.GenericKD.31733399
CAT-QuickHeal Trojan.Mauvaise.SL1
Comodo Application.Win32.Qjwmonkey.H@7z07ez
CrowdStrike win/malicious_confidence_80% (D)
Cybereason malicious.3d2869
Cyren W32/S-40b431b9!Eldorado
DrWeb Adware.Qjwmonkey.149
Emsisoft Trojan.GenericKD.31733399 (B)
Endgame malicious (high confidence)
ESET-NOD32 a variant of Win32/Adware.Qjwmonkey.H
F-Secure Adware.ADWARE/Qjwmonkey.hgyuq
FireEye Generic.mg.4533a213d286952a
Fortinet W32/GenericKD.48FB!tr
GData Trojan.GenericKD.31733399
Ikarus Trojan.Win32.Agent
Invincea heuristic
Jiangmin Downloader.Generic.akeb
K7AntiVirus Adware ( 005317961 )
K7GW Adware ( 005317961 )
Kaspersky not-a-virus:HEUR:Downloader.Win32.Generic
Malwarebytes Adware.Qjwmonkey
MAX malware (ai score=100)
MaxSecure Trojan.Malware.11727404.susgen
McAfee GenericRXGY-CQ!4533A213D286
McAfee-GW-Edition GenericRXGY-CQ!4533A213D286
Microsoft PUA:Win32/Qjwmonkey
MicroWorld-eScan Trojan.GenericKD.31733399
NANO-Antivirus Trojan.Win32.Snojan.fhmmgg
Paloalto generic.ml
Panda Trj/Genetic.gen
Rising Trojan.Generic!1.B5B0 (CLOUD)
SentinelOne DFI - Malicious PE
Sophos QjMonkey (PUA)
SUPERAntiSpyware Adware.QjwMonkey/Variant
Symantec SMG.Heur!gen
TrendMicro-HouseCall TROJ_GEN.R002C0OBR19
VBA32 BScope.Adware.Qjwmonkey
ViRobot Adware.Qjwmonkey.1343536.DD
Yandex PUA.Qjwmonkey!
Zillya Adware.Qjwmonkey.Win32.389
ZoneAlarm not-a-virus:HEUR:Downloader.Win32.Generic
50 of the 68 anti-virus programs detected the pandatxtool@2345_52472.exe file.

Sandbox Report

The following information was gathered by executing the file inside Cuckoo Sandbox.

Summary

Successfully executed process in sandbox.

Summary

{
    "file_created": [
        "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db"
    ],
    "regkey_written": [
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableFileTracing",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\MaxFileSize",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileDirectory",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableConsoleTracing",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\ConsoleTracingMask",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileTracingMask"
    ],
    "dll_loaded": [
        "urlmon.dll",
        "DNSAPI.dll",
        "kernel32.dll",
        "dwmapi.dll",
        "C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\\gdiplus.dll",
        "cryptsp.dll",
        "winhttp.dll",
        "C:\\Windows\\system32\\secur32.dll",
        "API-MS-WIN-Service-Management-L1-1-0.dll",
        "WININET.dll",
        "SspiCli.dll",
        "SHLWAPI.dll",
        "credssp.dll",
        "API-MS-WIN-Service-winsvc-L1-1-0.dll",
        "rtutils.dll",
        "Iphlpapi.dll",
        "WINTRUST.dll",
        "WindowsCodecs.dll",
        "RPCRT4.dll",
        "C:\\Windows\\System32\\wship6.dll",
        "Urlmon.dll",
        "C:\\Windows\\system32\\iphlpapi.dll",
        "C:\\Windows\\system32\\mswsock.dll",
        "ADVAPI32.dll",
        "rpcrt4.dll",
        "C:\\Windows\\System32\\wshtcpip.dll",
        "WS2_32.dll"
    ],
    "file_opened": [
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
        "C:\\Windows\\Fonts\\staticcache.dat",
        "\\??\\PhysicalDrive0"
    ],
    "regkey_opened": [
        "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}",
        "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\LsaExtensionConfig\\SspiCli",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings",
        "HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows NT\\Rpc",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}\\{EF381EA0-4D07-418D-A490-68AF67CE948B}\\Connection",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll",
        "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Video\\{6FABAC3A-B3E4-4C2F-82E9-AA53D01C5093}\\0000",
        "HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings",
        "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Shell.Explorer\\CLSID",
        "HKEY_CLASSES_ROOT\\FirefoxURL-E7CF176E110C211B\\shell\\open\\command\\",
        "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontLink\\SystemLink",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip6",
        "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing\\RASAPI32",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Winsock\\Setup Migration\\Providers",
        "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Rpc",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion",
        "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\SecurityProviders\\SaslProfiles",
        "HKEY_LOCAL_MACHINE\\System\\Setup",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback",
        "HKEY_CLASSES_ROOT\\CLSID\\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\\Instance\\Disabled",
        "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Shell\\Associations\\UrlAssociations\\http\\UserChoice\\",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\Tracing",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun",
        "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\Tcpip\\Parameters\\Winsock",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Winsock\\Parameters",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip",
        "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\LowRegistry",
        "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\DirectDraw\\GammaCalibrator",
        "HKEY_CURRENT_USER\\Shell.Explorer",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\msasn1",
        "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\SecurityProviders",
        "HKEY_CLASSES_ROOT\\CLSID\\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\\Instance",
        "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\Tcpip6\\Parameters\\Winsock",
        "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Lsa\\SspiCache",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0"
    ],
    "resolves_host": [
        "q.pieshua.com"
    ],
    "file_written": [
        "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db"
    ],
    "regkey_deleted": [
        "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\LowRegistry\\AddToFeedsInitialSelection",
        "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\LowRegistry\\AddToFavoritesInitialSelection"
    ],
    "file_exists": [
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin"
    ],
    "mutex": [
        "Local\\__DDrawExclMode__",
        "ATL:MemData03EACUCKPC",
        "Local\\__DDrawCheckExclMode__"
    ],
    "file_failed": [
        "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db"
    ],
    "guid": [
        "{8856f961-340a-11d0-a96b-00c04fd705a2}",
        "{00000000-0000-0000-c000-000000000046}"
    ],
    "file_read": [
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
        "C:\\Windows\\Fonts\\staticcache.dat"
    ],
    "regkey_read": [
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Rpc\\MaxRpcSize",
        "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Shell\\Associations\\UrlAssociations\\http\\UserChoice\\Progid",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\UseDelayedAcceptance",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0\\DataFilePath",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableConsoleTracing",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\SecurityProviders\\SecurityProviders",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}\\{EF381EA0-4D07-418D-A490-68AF67CE948B}\\Connection\\MediaSubType",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\Setup\\SystemSetupInProgress",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileTracingMask",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Language Groups\\1",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\EnableConsoleTracing",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane10",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane11",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane12",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane13",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane14",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane15",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane16",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Parameters\\Transports",
        "HKEY_CURRENT_USER\\FirefoxURL-E7CF176E110C211B\\shell\\open\\command\\(Default)",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\InstallDate",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Locale\\00000409",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\ForceDriverFlagsOff",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileDirectory",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Type",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Comment",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\MaxFileSize",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane4",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableFileTracing",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\HelperDllName",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip6\\WinSock 2.0 Provider ID",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\Mapping",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane14",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane15",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\UseDelayedAcceptance",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Video\\{6FABAC3A-B3E4-4C2F-82E9-AA53D01C5093}\\0000\\InstalledDisplayDrivers",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane10",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane11",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane12",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane13",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\LsaExtensionConfig\\SspiCli\\CheckSignatureRoutine",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\Drivers\\SoftwareOnly",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane6",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane7",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\MinSockaddrLength",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane5",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane2",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane3",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane1",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane8",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane9",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\MinSockaddrLength",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\LsaExtensionConfig\\SspiCli\\CheckSignatureDll",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\LoadDebugRuntime",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Name",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\MaxSockaddrLength",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\MaxSockaddrLength",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\HelperDllName",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\Setup\\OOBEInProgress",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Security_HKLM_only",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\TokenSize",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Capabilities",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Shell.Explorer\\CLSID\\(Default)",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0\\Disable",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip\\WinSock 2.0 Provider ID",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ShareCredsWithWinHttp",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\Tracing\\Enabled",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\ComputerName\\ActiveComputerName\\ComputerName",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\GRE_Initialize\\DisableMetaFiles",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane8",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane9",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane6",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane7",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane4",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane5",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane2",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane3",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane1",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\DisableBranchCache",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\SQMClient\\Windows\\CEIPEnable",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\RpcId",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane16",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\DisableImprovedZoneCheck",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\ConsoleTracingMask",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\Mapping",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Version"
    ]
}

Dropped

[
    {
        "yara": [],
        "sha1": "fde8eef8b2254a474ff7ea04e0642039805d9b0a",
        "name": "da8c1150075f581b_globalmgr.db",
        "filepath": "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db",
        "type": "ASCII text, with CRLF line terminators",
        "sha256": "da8c1150075f581b315515290ca8b9d5d18ff897162887a5620669cd92ae7b77",
        "urls": [],
        "crc32": "C29EDCC0",
        "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/4428\/files\/da8c1150075f581b_globalmgr.db",
        "ssdeep": null,
        "size": 190,
        "sha512": "1c72f4402a76a88e615f2c16ab9251794e8d4d9a73b3503033cadabcb428e0b196ddccd662c1df73d854bedeec93aeab55e0368f4ab6e85c37c875535c88723b",
        "pids": [
            2800
        ],
        "md5": "b2305cb44a0de0d0aa30986c80949a48"
    }
]

Generic

[
    {
        "process_path": "C:\\Users\\cuck\\AppData\\Local\\Temp\\5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
        "process_name": "5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
        "pid": 2800,
        "summary": {
            "file_created": [
                "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db"
            ],
            "regkey_written": [
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableFileTracing",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\MaxFileSize",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileDirectory",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableConsoleTracing",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\ConsoleTracingMask",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileTracingMask"
            ],
            "dll_loaded": [
                "urlmon.dll",
                "DNSAPI.dll",
                "kernel32.dll",
                "dwmapi.dll",
                "C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\\gdiplus.dll",
                "cryptsp.dll",
                "winhttp.dll",
                "C:\\Windows\\system32\\secur32.dll",
                "API-MS-WIN-Service-Management-L1-1-0.dll",
                "WININET.dll",
                "SspiCli.dll",
                "SHLWAPI.dll",
                "credssp.dll",
                "API-MS-WIN-Service-winsvc-L1-1-0.dll",
                "rtutils.dll",
                "Iphlpapi.dll",
                "WINTRUST.dll",
                "WindowsCodecs.dll",
                "RPCRT4.dll",
                "C:\\Windows\\System32\\wship6.dll",
                "Urlmon.dll",
                "C:\\Windows\\system32\\iphlpapi.dll",
                "C:\\Windows\\system32\\mswsock.dll",
                "ADVAPI32.dll",
                "rpcrt4.dll",
                "C:\\Windows\\System32\\wshtcpip.dll",
                "WS2_32.dll"
            ],
            "file_opened": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
                "C:\\Windows\\Fonts\\staticcache.dat",
                "\\??\\PhysicalDrive0"
            ],
            "regkey_opened": [
                "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}",
                "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\LsaExtensionConfig\\SspiCli",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings",
                "HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows NT\\Rpc",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}\\{EF381EA0-4D07-418D-A490-68AF67CE948B}\\Connection",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll",
                "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Video\\{6FABAC3A-B3E4-4C2F-82E9-AA53D01C5093}\\0000",
                "HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings",
                "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Shell.Explorer\\CLSID",
                "HKEY_CLASSES_ROOT\\FirefoxURL-E7CF176E110C211B\\shell\\open\\command\\",
                "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontLink\\SystemLink",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip6",
                "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing\\RASAPI32",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Winsock\\Setup Migration\\Providers",
                "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Rpc",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion",
                "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\SecurityProviders\\SaslProfiles",
                "HKEY_LOCAL_MACHINE\\System\\Setup",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback",
                "HKEY_CLASSES_ROOT\\CLSID\\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\\Instance\\Disabled",
                "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Shell\\Associations\\UrlAssociations\\http\\UserChoice\\",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\Tracing",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun",
                "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\Tcpip\\Parameters\\Winsock",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Winsock\\Parameters",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip",
                "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\LowRegistry",
                "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\DirectDraw\\GammaCalibrator",
                "HKEY_CURRENT_USER\\Shell.Explorer",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\msasn1",
                "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\SecurityProviders",
                "HKEY_CLASSES_ROOT\\CLSID\\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\\Instance",
                "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\Tcpip6\\Parameters\\Winsock",
                "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Lsa\\SspiCache",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0"
            ],
            "resolves_host": [
                "q.pieshua.com"
            ],
            "file_written": [
                "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db"
            ],
            "regkey_deleted": [
                "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\LowRegistry\\AddToFeedsInitialSelection",
                "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Explorer\\LowRegistry\\AddToFavoritesInitialSelection"
            ],
            "file_exists": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin"
            ],
            "mutex": [
                "Local\\__DDrawExclMode__",
                "ATL:MemData03EACUCKPC",
                "Local\\__DDrawCheckExclMode__"
            ],
            "file_failed": [
                "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db"
            ],
            "guid": [
                "{8856f961-340a-11d0-a96b-00c04fd705a2}",
                "{00000000-0000-0000-c000-000000000046}"
            ],
            "file_read": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
                "C:\\Windows\\Fonts\\staticcache.dat"
            ],
            "regkey_read": [
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Rpc\\MaxRpcSize",
                "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Shell\\Associations\\UrlAssociations\\http\\UserChoice\\Progid",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\UseDelayedAcceptance",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0\\DataFilePath",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableConsoleTracing",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\SecurityProviders\\SecurityProviders",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}\\{EF381EA0-4D07-418D-A490-68AF67CE948B}\\Connection\\MediaSubType",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\Setup\\SystemSetupInProgress",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileTracingMask",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Language Groups\\1",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\EnableConsoleTracing",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane10",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane11",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane12",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane13",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane14",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane15",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane16",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Parameters\\Transports",
                "HKEY_CURRENT_USER\\FirefoxURL-E7CF176E110C211B\\shell\\open\\command\\(Default)",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\InstallDate",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Locale\\00000409",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\ForceDriverFlagsOff",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileDirectory",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Type",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Comment",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\MaxFileSize",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane4",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableFileTracing",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\HelperDllName",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip6\\WinSock 2.0 Provider ID",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\Mapping",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane14",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane15",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\UseDelayedAcceptance",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Video\\{6FABAC3A-B3E4-4C2F-82E9-AA53D01C5093}\\0000\\InstalledDisplayDrivers",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane10",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane11",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane12",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane13",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\LsaExtensionConfig\\SspiCli\\CheckSignatureRoutine",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\Drivers\\SoftwareOnly",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane6",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane7",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\MinSockaddrLength",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane5",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane2",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane3",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane1",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane8",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane9",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\MinSockaddrLength",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\LsaExtensionConfig\\SspiCli\\CheckSignatureDll",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\LoadDebugRuntime",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Name",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\MaxSockaddrLength",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\MaxSockaddrLength",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\HelperDllName",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\Setup\\OOBEInProgress",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Security_HKLM_only",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\TokenSize",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Capabilities",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Shell.Explorer\\CLSID\\(Default)",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0\\Disable",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip\\WinSock 2.0 Provider ID",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ShareCredsWithWinHttp",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\Tracing\\Enabled",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\ComputerName\\ActiveComputerName\\ComputerName",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\GRE_Initialize\\DisableMetaFiles",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane8",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane9",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane6",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane7",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane4",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane5",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane2",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane3",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane1",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\DisableBranchCache",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\SQMClient\\Windows\\CEIPEnable",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\RpcId",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane16",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\DisableImprovedZoneCheck",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\ConsoleTracingMask",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\Mapping",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Version"
            ]
        },
        "first_seen": 1576914784.78125,
        "ppid": 2736
    },
    {
        "process_path": "C:\\Windows\\System32\\lsass.exe",
        "process_name": "lsass.exe",
        "pid": 476,
        "summary": {},
        "first_seen": 1576914784.4375,
        "ppid": 376
    }
]

Signatures

[
    {
        "markcount": 1,
        "families": [],
        "description": "Queries for the computername",
        "severity": 1,
        "marks": [
            {
                "call": {
                    "category": "misc",
                    "status": 1,
                    "stacktrace": [],
                    "api": "GetComputerNameW",
                    "return_value": 1,
                    "arguments": {
                        "computer_name": "CUCKPC"
                    },
                    "time": 1576914784.92225,
                    "tid": 2816,
                    "flags": {}
                },
                "pid": 2800,
                "type": "call",
                "cid": 404
            }
        ],
        "references": [],
        "name": "antivm_queries_computername"
    },
    {
        "markcount": 1,
        "families": [],
        "description": "Checks if process is being debugged by a debugger",
        "severity": 1,
        "marks": [
            {
                "call": {
                    "category": "system",
                    "status": 0,
                    "stacktrace": [],
                    "last_error": 0,
                    "nt_status": -1073741772,
                    "api": "IsDebuggerPresent",
                    "return_value": 0,
                    "arguments": {},
                    "time": 1576914784.92225,
                    "tid": 2816,
                    "flags": {}
                },
                "pid": 2800,
                "type": "call",
                "cid": 434
            }
        ],
        "references": [],
        "name": "checks_debugger"
    },
    {
        "markcount": 1,
        "families": [],
        "description": "Collects information to fingerprint the system (MachineGuid, DigitalProductId, SystemBiosDate)",
        "severity": 1,
        "marks": [
            {
                "category": "registry",
                "ioc": "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\InstallDate",
                "type": "ioc",
                "description": null
            }
        ],
        "references": [],
        "name": "recon_fingerprint"
    },
    {
        "markcount": 1,
        "families": [],
        "description": "Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available",
        "severity": 1,
        "marks": [
            {
                "call": {
                    "category": "system",
                    "status": 1,
                    "stacktrace": [],
                    "api": "GlobalMemoryStatusEx",
                    "return_value": 1,
                    "arguments": {},
                    "time": 1576914784.92225,
                    "tid": 2816,
                    "flags": {}
                },
                "pid": 2800,
                "type": "call",
                "cid": 458
            }
        ],
        "references": [],
        "name": "antivm_memory_available"
    },
    {
        "markcount": 3,
        "families": [],
        "description": "The executable contains unknown PE section names indicative of a packer (could be a false positive)",
        "severity": 1,
        "marks": [
            {
                "category": "section",
                "ioc": ".dtc",
                "type": "ioc",
                "description": null
            },
            {
                "category": "section",
                "ioc": ".dtd",
                "type": "ioc",
                "description": null
            },
            {
                "category": "section",
                "ioc": ".phx",
                "type": "ioc",
                "description": null
            }
        ],
        "references": [],
        "name": "pe_features"
    },
    {
        "markcount": 1,
        "families": [],
        "description": "The file contains an unknown PE resource name possibly indicative of a packer",
        "severity": 1,
        "marks": [
            {
                "category": "resource name",
                "ioc": "PNG",
                "type": "ioc",
                "description": null
            }
        ],
        "references": [],
        "name": "pe_unknown_resource_name"
    },
    {
        "markcount": 1,
        "families": [],
        "description": "One or more processes crashed",
        "severity": 1,
        "marks": [
            {
                "call": {
                    "category": "__notification__",
                    "status": 1,
                    "stacktrace": [],
                    "raw": [
                        "stacktrace"
                    ],
                    "api": "__exception__",
                    "return_value": 0,
                    "arguments": {
                        "stacktrace": "5\nd\nf\n6\n1\nd\nb\nb\n3\nd\n4\n9\na\n8\n6\n8\na\n4\n9\nc\n8\n2\n0\n9\n7\n2\n9\n4\n5\n0\na\nf\nc\n2\n6\n7\nf\na\nb\nb\n3\na\n8\nc\n7\n0\n7\n4\n2\n0\n6\n2\nf\n1\n6\nf\nd\n6\n0\ne\n4\n4\n0\n8\n+\n0\nx\n2\n3\n3\n8\nd\n \n@\n \n0\nx\nc\n3\n3\n8\nd\n\n\n5\nd\nf\n6\n1\nd\nb\nb\n3\nd\n4\n9\na\n8\n6\n8\na\n4\n9\nc\n8\n2\n0\n9\n7\n2\n9\n4\n5\n0\na\nf\nc\n2\n6\n7\nf\na\nb\nb\n3\na\n8\nc\n7\n0\n7\n4\n2\n0\n6\n2\nf\n1\n6\nf\nd\n6\n0\ne\n4\n4\n0\n8\n+\n0\nx\n8\nd\n3\ne\n \n@\n \n0\nx\na\n8\nd\n3\ne\n\n\n5\nd\nf\n6\n1\nd\nb\nb\n3\nd\n4\n9\na\n8\n6\n8\na\n4\n9\nc\n8\n2\n0\n9\n7\n2\n9\n4\n5\n0\na\nf\nc\n2\n6\n7\nf\na\nb\nb\n3\na\n8\nc\n7\n0\n7\n4\n2\n0\n6\n2\nf\n1\n6\nf\nd\n6\n0\ne\n4\n4\n0\n8\n+\n0\nx\n1\nc\n4\n6\n \n@\n \n0\nx\na\n1\nc\n4\n6\n\n\n5\nd\nf\n6\n1\nd\nb\nb\n3\nd\n4\n9\na\n8\n6\n8\na\n4\n9\nc\n8\n2\n0\n9\n7\n2\n9\n4\n5\n0\na\nf\nc\n2\n6\n7\nf\na\nb\nb\n3\na\n8\nc\n7\n0\n7\n4\n2\n0\n6\n2\nf\n1\n6\nf\nd\n6\n0\ne\n4\n4\n0\n8\n+\n0\nx\nc\na\nc\n4\na\n \n@\n \n0\nx\n1\n6\na\nc\n4\na\n\n\nB\na\ns\ne\nT\nh\nr\ne\na\nd\nI\nn\ni\nt\nT\nh\nu\nn\nk\n+\n0\nx\n1\n2\n \nV\ne\nr\ni\nf\ny\nC\no\nn\ns\no\nl\ne\nI\no\nH\na\nn\nd\nl\ne\n-\n0\nx\nb\n3\n \nk\ne\nr\nn\ne\nl\n3\n2\n+\n0\nx\n1\n3\n3\nc\na\n \n@\n \n0\nx\n7\n5\nb\nc\n3\n3\nc\na\n\n\nR\nt\nl\nI\nn\ni\nt\ni\na\nl\ni\nz\ne\nE\nx\nc\ne\np\nt\ni\no\nn\nC\nh\na\ni\nn\n+\n0\nx\n6\n3\n \nR\nt\nl\nA\nl\nl\no\nc\na\nt\ne\nA\nc\nt\ni\nv\na\nt\ni\no\nn\nC\no\nn\nt\ne\nx\nt\nS\nt\na\nc\nk\n-\n0\nx\na\n1\n \nn\nt\nd\nl\nl\n+\n0\nx\n3\n9\ne\nd\n2\n \n@\n \n0\nx\n7\n7\nb\nc\n9\ne\nd\n2\n\n\nR\nt\nl\nI\nn\ni\nt\ni\na\nl\ni\nz\ne\nE\nx\nc\ne\np\nt\ni\no\nn\nC\nh\na\ni\nn\n+\n0\nx\n3\n6\n \nR\nt\nl\nA\nl\nl\no\nc\na\nt\ne\nA\nc\nt\ni\nv\na\nt\ni\no\nn\nC\no\nn\nt\ne\nx\nt\nS\nt\na\nc\nk\n-\n0\nx\nc\ne\n \nn\nt\nd\nl\nl\n+\n0\nx\n3\n9\ne\na\n5\n \n@\n \n0\nx\n7\n7\nb\nc\n9\ne\na\n5",
                        "registers": {
                            "esp": 4977276,
                            "edi": 5397688,
                            "eax": 1447909480,
                            "ebp": 4977332,
                            "edx": 22104,
                            "ebx": 0,
                            "esi": 5471912,
                            "ecx": 10
                        },
                        "exception": {
                            "instruction_r": "ed 81 fb 68 58 4d 56 0f 94 45 e4 5b 59 5a c7 45",
                            "symbol": "5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408+0x2f138",
                            "instruction": "in eax, dx",
                            "module": "5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
                            "exception_code": "0xc0000096",
                            "offset": 192824,
                            "address": "0xcf138"
                        }
                    },
                    "time": 1576914784.93725,
                    "tid": 2816,
                    "flags": {}
                },
                "pid": 2800,
                "type": "call",
                "cid": 481
            }
        ],
        "references": [],
        "name": "raises_exception"
    },
    {
        "markcount": 4,
        "families": [],
        "description": "Allocates read-write-execute memory (usually to unpack itself)",
        "severity": 2,
        "marks": [
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtAllocateVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 2800,
                        "region_size": 65536,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 1,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "allocation_type": 12288,
                        "base_address": "0x6dbb0000"
                    },
                    "time": 1576914785.00025,
                    "tid": 2816,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE",
                        "allocation_type": "MEM_COMMIT|MEM_RESERVE"
                    }
                },
                "pid": 2800,
                "type": "call",
                "cid": 963
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 2800,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x75bc7000"
                    },
                    "time": 1576914785.00025,
                    "tid": 2816,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 2800,
                "type": "call",
                "cid": 964
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 2800,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 1,
                        "length": 65536,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x6dbb0000"
                    },
                    "time": 1576914827.76625,
                    "tid": 2816,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 2800,
                "type": "call",
                "cid": 1631
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 2800,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x75bc7000"
                    },
                    "time": 1576914827.76625,
                    "tid": 2816,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 2800,
                "type": "call",
                "cid": 1632
            }
        ],
        "references": [],
        "name": "allocates_rwx"
    },
    {
        "markcount": 11,
        "families": [],
        "description": "Foreign language identified in PE resource",
        "severity": 2,
        "marks": [
            {
                "name": "PNG",
                "language": "LANG_CHINESE",
                "offset": "0x00134d68",
                "filetype": "PNG image data, 260 x 180, 8-bit\/color RGBA, non-interlaced",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x0000bc26"
            },
            {
                "name": "RT_ICON",
                "language": "LANG_CHINESE",
                "offset": "0x00134608",
                "filetype": "GLS_BINARY_LSB_FIRST",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000468"
            },
            {
                "name": "RT_ICON",
                "language": "LANG_CHINESE",
                "offset": "0x00134608",
                "filetype": "GLS_BINARY_LSB_FIRST",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000468"
            },
            {
                "name": "RT_ICON",
                "language": "LANG_CHINESE",
                "offset": "0x00134608",
                "filetype": "GLS_BINARY_LSB_FIRST",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000468"
            },
            {
                "name": "RT_ICON",
                "language": "LANG_CHINESE",
                "offset": "0x00134608",
                "filetype": "GLS_BINARY_LSB_FIRST",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000468"
            },
            {
                "name": "RT_ICON",
                "language": "LANG_CHINESE",
                "offset": "0x00134608",
                "filetype": "GLS_BINARY_LSB_FIRST",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000468"
            },
            {
                "name": "RT_ICON",
                "language": "LANG_CHINESE",
                "offset": "0x00134608",
                "filetype": "GLS_BINARY_LSB_FIRST",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000468"
            },
            {
                "name": "RT_MENU",
                "language": "LANG_CHINESE",
                "offset": "0x00134ad0",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000026"
            },
            {
                "name": "RT_STRING",
                "language": "LANG_CHINESE",
                "offset": "0x00140990",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x00000048"
            },
            {
                "name": "RT_GROUP_ICON",
                "language": "LANG_CHINESE",
                "offset": "0x00134a70",
                "filetype": "MS Windows icon resource - 6 icons, 48x48",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x0000005a"
            },
            {
                "name": "RT_VERSION",
                "language": "LANG_CHINESE",
                "offset": "0x00134af8",
                "filetype": "data",
                "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED",
                "type": "generic",
                "size": "0x0000026c"
            }
        ],
        "references": [],
        "name": "origin_langid"
    },
    {
        "markcount": 1,
        "families": [],
        "description": "The binary likely contains encrypted or compressed data indicative of a packer",
        "severity": 2,
        "marks": [
            {
                "entropy": 7.178726272624375,
                "section": {
                    "size_of_data": "0x00011c00",
                    "virtual_address": "0x0012f000",
                    "entropy": 7.178726272624375,
                    "name": ".rsrc",
                    "virtual_size": "0x00011b60"
                },
                "type": "generic",
                "description": "A section with a high entropy has been found"
            }
        ],
        "references": [
            "http:\/\/www.forensickb.com\/2013\/03\/file-entropy-explained.html",
            "http:\/\/virii.es\/U\/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf"
        ],
        "name": "packer_entropy"
    },
    {
        "markcount": 10,
        "families": [],
        "description": "Repeatedly searches for a not-found process, you may want to run a web browser during analysis",
        "severity": 2,
        "marks": [
            {
                "call": {
                    "category": "process",
                    "status": 0,
                    "stacktrace": [],
                    "last_error": 18,
                    "nt_status": 0,
                    "api": "Process32NextW",
                    "return_value": 0,
                    "arguments": {
                        "process_name": "5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
                        "snapshot_handle": "0x000001a8",
                        "process_identifier": 2800
                    },
                    "time": 1576914784.95325,
                    "tid": 2816,
                    "flags": {}
                },
                "pid": 2800,
                "type": "call",
                "cid": 543
            },
            {
                "call": {
                    "category": "process",
                    "status": 0,
                    "stacktrace": [],
                    "last_error": 18,
                    "nt_status": 0,
                    "api": "Process32NextW",
                    "return_value": 0,
                    "arguments": {
                        "process_name": "5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
                        "snapshot_handle": "0x000001a8",
                        "process_identifier": 2800
                    },
                    "time": 1576914784.95325,
                    "tid": 2816,
                    "flags": {}
                },
                "pid": 2800,
                "type": "call",
                "cid": 584
            },
            {
                "call": {
                    "category": "process",
                    "status": 0,
                    "stacktrace": [],
                    "last_error": 18,
                    "nt_status": 0,
                    "api": "Process32NextW",
                    "return_value": 0,
                    "arguments": {
                        "process_name": "5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
                        "snapshot_handle": "0x000001a8",
                        "process_identifier": 2800
                    },
                    "time": 1576914784.96925,
                    "tid": 2816,
                    "flags": {}
                },
                "pid": 2800,
                "type": "call",
                "cid": 625
            },
            {
                "call": {
                    "category": "process",
                    "status": 0,
                    "stacktrace": [],
                    "last_error": 18,
                    "nt_status": 0,
                    "api": "Process32NextW",
                    "return_value": 0,
                    "arguments": {
                        "process_name": "5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
                        "snapshot_handle": "0x000001a8",
                        "process_identifier": 2800
                    },
                    "time": 1576914784.96925,
                    "tid": 2816,
                    "flags": {}
                },
                "pid": 2800,
                "type": "call",
                "cid": 666
            },
            {
                "call": {
                    "category": "process",
                    "status": 0,
                    "stacktrace": [],
                    "last_error": 18,
                    "nt_status": 0,
                    "api": "Process32NextW",
                    "return_value": 0,
                    "arguments": {
                        "process_name": "5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
                        "snapshot_handle": "0x000001a8",
                        "process_identifier": 2800
                    },
                    "time": 1576914784.96925,
                    "tid": 2816,
                    "flags": {}
                },
                "pid": 2800,
                "type": "call",
                "cid": 707
            },
            {
                "call": {
                    "category": "process",
                    "status": 0,
                    "stacktrace": [],
                    "last_error": 18,
                    "nt_status": 0,
                    "api": "Process32NextW",
                    "return_value": 0,
                    "arguments": {
                        "process_name": "5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
                        "snapshot_handle": "0x000001a8",
                        "process_identifier": 2800
                    },
                    "time": 1576914784.96925,
                    "tid": 2816,
                    "flags": {}
                },
                "pid": 2800,
                "type": "call",
                "cid": 748
            },
            {
                "call": {
                    "category": "process",
                    "status": 0,
                    "stacktrace": [],
                    "last_error": 18,
                    "nt_status": 0,
                    "api": "Process32NextW",
                    "return_value": 0,
                    "arguments": {
                        "process_name": "5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
                        "snapshot_handle": "0x000001a8",
                        "process_identifier": 2800
                    },
                    "time": 1576914784.96925,
                    "tid": 2816,
                    "flags": {}
                },
                "pid": 2800,
                "type": "call",
                "cid": 789
            },
            {
                "call": {
                    "category": "process",
                    "status": 0,
                    "stacktrace": [],
                    "last_error": 18,
                    "nt_status": 0,
                    "api": "Process32NextW",
                    "return_value": 0,
                    "arguments": {
                        "process_name": "5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
                        "snapshot_handle": "0x000001a8",
                        "process_identifier": 2800
                    },
                    "time": 1576914784.98425,
                    "tid": 2816,
                    "flags": {}
                },
                "pid": 2800,
                "type": "call",
                "cid": 830
            },
            {
                "call": {
                    "category": "process",
                    "status": 0,
                    "stacktrace": [],
                    "last_error": 18,
                    "nt_status": 0,
                    "api": "Process32NextW",
                    "return_value": 0,
                    "arguments": {
                        "process_name": "5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
                        "snapshot_handle": "0x000001a8",
                        "process_identifier": 2800
                    },
                    "time": 1576914784.98425,
                    "tid": 2816,
                    "flags": {}
                },
                "pid": 2800,
                "type": "call",
                "cid": 871
            },
            {
                "call": {
                    "category": "process",
                    "status": 0,
                    "stacktrace": [],
                    "last_error": 18,
                    "nt_status": 0,
                    "api": "Process32NextW",
                    "return_value": 0,
                    "arguments": {
                        "process_name": "5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
                        "snapshot_handle": "0x000001a8",
                        "process_identifier": 2800
                    },
                    "time": 1576914784.98425,
                    "tid": 2816,
                    "flags": {}
                },
                "pid": 2800,
                "type": "call",
                "cid": 912
            }
        ],
        "references": [],
        "name": "process_needed"
    },
    {
        "markcount": 1,
        "families": [],
        "description": "Detects VMWare through the in instruction feature",
        "severity": 3,
        "marks": [
            {
                "call": {
                    "category": "__notification__",
                    "status": 1,
                    "stacktrace": [],
                    "raw": [
                        "stacktrace"
                    ],
                    "api": "__exception__",
                    "return_value": 0,
                    "arguments": {
                        "stacktrace": "5\nd\nf\n6\n1\nd\nb\nb\n3\nd\n4\n9\na\n8\n6\n8\na\n4\n9\nc\n8\n2\n0\n9\n7\n2\n9\n4\n5\n0\na\nf\nc\n2\n6\n7\nf\na\nb\nb\n3\na\n8\nc\n7\n0\n7\n4\n2\n0\n6\n2\nf\n1\n6\nf\nd\n6\n0\ne\n4\n4\n0\n8\n+\n0\nx\n2\n3\n3\n8\nd\n \n@\n \n0\nx\nc\n3\n3\n8\nd\n\n\n5\nd\nf\n6\n1\nd\nb\nb\n3\nd\n4\n9\na\n8\n6\n8\na\n4\n9\nc\n8\n2\n0\n9\n7\n2\n9\n4\n5\n0\na\nf\nc\n2\n6\n7\nf\na\nb\nb\n3\na\n8\nc\n7\n0\n7\n4\n2\n0\n6\n2\nf\n1\n6\nf\nd\n6\n0\ne\n4\n4\n0\n8\n+\n0\nx\n8\nd\n3\ne\n \n@\n \n0\nx\na\n8\nd\n3\ne\n\n\n5\nd\nf\n6\n1\nd\nb\nb\n3\nd\n4\n9\na\n8\n6\n8\na\n4\n9\nc\n8\n2\n0\n9\n7\n2\n9\n4\n5\n0\na\nf\nc\n2\n6\n7\nf\na\nb\nb\n3\na\n8\nc\n7\n0\n7\n4\n2\n0\n6\n2\nf\n1\n6\nf\nd\n6\n0\ne\n4\n4\n0\n8\n+\n0\nx\n1\nc\n4\n6\n \n@\n \n0\nx\na\n1\nc\n4\n6\n\n\n5\nd\nf\n6\n1\nd\nb\nb\n3\nd\n4\n9\na\n8\n6\n8\na\n4\n9\nc\n8\n2\n0\n9\n7\n2\n9\n4\n5\n0\na\nf\nc\n2\n6\n7\nf\na\nb\nb\n3\na\n8\nc\n7\n0\n7\n4\n2\n0\n6\n2\nf\n1\n6\nf\nd\n6\n0\ne\n4\n4\n0\n8\n+\n0\nx\nc\na\nc\n4\na\n \n@\n \n0\nx\n1\n6\na\nc\n4\na\n\n\nB\na\ns\ne\nT\nh\nr\ne\na\nd\nI\nn\ni\nt\nT\nh\nu\nn\nk\n+\n0\nx\n1\n2\n \nV\ne\nr\ni\nf\ny\nC\no\nn\ns\no\nl\ne\nI\no\nH\na\nn\nd\nl\ne\n-\n0\nx\nb\n3\n \nk\ne\nr\nn\ne\nl\n3\n2\n+\n0\nx\n1\n3\n3\nc\na\n \n@\n \n0\nx\n7\n5\nb\nc\n3\n3\nc\na\n\n\nR\nt\nl\nI\nn\ni\nt\ni\na\nl\ni\nz\ne\nE\nx\nc\ne\np\nt\ni\no\nn\nC\nh\na\ni\nn\n+\n0\nx\n6\n3\n \nR\nt\nl\nA\nl\nl\no\nc\na\nt\ne\nA\nc\nt\ni\nv\na\nt\ni\no\nn\nC\no\nn\nt\ne\nx\nt\nS\nt\na\nc\nk\n-\n0\nx\na\n1\n \nn\nt\nd\nl\nl\n+\n0\nx\n3\n9\ne\nd\n2\n \n@\n \n0\nx\n7\n7\nb\nc\n9\ne\nd\n2\n\n\nR\nt\nl\nI\nn\ni\nt\ni\na\nl\ni\nz\ne\nE\nx\nc\ne\np\nt\ni\no\nn\nC\nh\na\ni\nn\n+\n0\nx\n3\n6\n \nR\nt\nl\nA\nl\nl\no\nc\na\nt\ne\nA\nc\nt\ni\nv\na\nt\ni\no\nn\nC\no\nn\nt\ne\nx\nt\nS\nt\na\nc\nk\n-\n0\nx\nc\ne\n \nn\nt\nd\nl\nl\n+\n0\nx\n3\n9\ne\na\n5\n \n@\n \n0\nx\n7\n7\nb\nc\n9\ne\na\n5",
                        "registers": {
                            "esp": 4977276,
                            "edi": 5397688,
                            "eax": 1447909480,
                            "ebp": 4977332,
                            "edx": 22104,
                            "ebx": 0,
                            "esi": 5471912,
                            "ecx": 10
                        },
                        "exception": {
                            "instruction_r": "ed 81 fb 68 58 4d 56 0f 94 45 e4 5b 59 5a c7 45",
                            "symbol": "5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408+0x2f138",
                            "instruction": "in eax, dx",
                            "module": "5df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408.bin",
                            "exception_code": "0xc0000096",
                            "offset": 192824,
                            "address": "0xcf138"
                        }
                    },
                    "time": 1576914784.93725,
                    "tid": 2816,
                    "flags": {}
                },
                "pid": 2800,
                "type": "call",
                "cid": 481
            }
        ],
        "references": [],
        "name": "antivm_vmware_in_instruction"
    }
]

Yara

The Yara rules did not detect anything in the file.

Network

{
    "tls": [],
    "udp": [
        {
            "src": "192.168.56.101",
            "dst": "192.168.56.255",
            "offset": 546,
            "time": 3.079115152359009,
            "dport": 137,
            "sport": 137
        },
        {
            "src": "192.168.56.101",
            "dst": "192.168.56.255",
            "offset": 15594,
            "time": 9.078274011611938,
            "dport": 138,
            "sport": 138
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 17438,
            "time": 3.0393872261047363,
            "dport": 5355,
            "sport": 51001
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 17766,
            "time": 1.0177230834960938,
            "dport": 5355,
            "sport": 53595
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 18094,
            "time": 3.0510032176971436,
            "dport": 5355,
            "sport": 53848
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 18422,
            "time": 1.6164231300354004,
            "dport": 5355,
            "sport": 54255
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 18750,
            "time": -0.08516383171081543,
            "dport": 5355,
            "sport": 55314
        },
        {
            "src": "192.168.56.101",
            "dst": "239.255.255.250",
            "offset": 19078,
            "time": 1.093529224395752,
            "dport": 1900,
            "sport": 1900
        },
        {
            "src": "192.168.56.101",
            "dst": "239.255.255.250",
            "offset": 38488,
            "time": 1.051206111907959,
            "dport": 3702,
            "sport": 49152
        },
        {
            "src": "192.168.56.101",
            "dst": "239.255.255.250",
            "offset": 46872,
            "time": 3.142362117767334,
            "dport": 1900,
            "sport": 53598
        }
    ],
    "dns_servers": [],
    "http": [],
    "icmp": [],
    "smtp": [],
    "tcp": [],
    "smtp_ex": [],
    "mitm": [],
    "hosts": [],
    "pcap_sha256": "a13f1901a0c53a6c23bb79c821aafa5485e5df2a45bad86b147275b3349ab97a",
    "dns": [],
    "http_ex": [],
    "domains": [],
    "dead_hosts": [],
    "sorted_pcap_sha256": "64ffac1d917b4cd718c56b9a6f2e01dab935e60401596bb414a42de5f6e52ec0",
    "irc": [],
    "https_ex": []
}

Screenshots

Screenshot from the sandboxScreenshot from the sandbox

pandatxtool@2345_52472.exe removal instructions

The instructions below shows how to remove pandatxtool@2345_52472.exe with help from the FreeFixer removal tool. Basically, you install FreeFixer, scan your computer, check the pandatxtool@2345_52472.exe file for removal, restart your computer and scan it again to verify that pandatxtool@2345_52472.exe has been successfully removed. Here are the removal instructions in more detail:

  1. Download and install FreeFixer: http://www.freefixer.com/download.html
  2. Start FreeFixer and press the Start Scan button. The scan will finish in approximately five minutes.
    Screenshot of Start Scan button
  3. When the scan is finished, locate pandatxtool@2345_52472.exe in the scan result and tick the checkbox next to the pandatxtool@2345_52472.exe file. Do not check any other file for removal unless you are 100% sure you want to delete it. Tip: Press CTRL-F to open up FreeFixer's search dialog to quickly locate pandatxtool@2345_52472.exe in the scan result.
    Red arrow point on the unwanted file
    c:\downloads\pandatxtool@2345_52472.exe
  4. Scroll down to the bottom of the scan result and press the Fix button. FreeFixer will now delete the pandatxtool@2345_52472.exe file.
    Screenshot of Fix button
  5. Restart your computer.
  6. Start FreeFixer and scan your computer again. If pandatxtool@2345_52472.exe still remains in the scan result, proceed with the next step. If pandatxtool@2345_52472.exe is gone from the scan result you're done.
  7. If pandatxtool@2345_52472.exe still remains in the scan result, check its checkbox again in the scan result and click Fix.
  8. Restart your computer.
  9. Start FreeFixer and scan your computer again. Verify that pandatxtool@2345_52472.exe no longer appear in the scan result.
Please select the option that best describe your thoughts on the removal instructions given above








Free Questionnaires

Hashes [?]

PropertyValue
MD54533a213d286952aca0010e56afd5ff0
SHA2565df61dbb3d49a868a49c8209729450afc267fabb3a8c70742062f16fd60e4408

Error Messages

These are some of the error messages that can appear related to pandatxtool@2345_52472.exe:

pandatxtool@2345_52472.exe has encountered a problem and needs to close. We are sorry for the inconvenience.

pandatxtool@2345_52472.exe - Application Error. The instruction at "0xXXXXXXXX" referenced memory at "0xXXXXXXXX". The memory could not be "read/written". Click on OK to terminate the program.

????? has stopped working.

End Program - pandatxtool@2345_52472.exe. This program is not responding.

pandatxtool@2345_52472.exe is not a valid Win32 application.

pandatxtool@2345_52472.exe - Application Error. The application failed to initialize properly (0xXXXXXXXX). Click OK to terminate the application.

What will you do with the file?

To help other users, please let us know what you will do with the file:



Comments

Please share with the other users what you think about this file. What does this file do? Is it legitimate or something that your computer is better without? Do you know how it was installed on your system? Did you install it yourself or did it come bundled with some other software? Is it running smoothly or do you get some error message? Any information that will help to document this file is welcome. Thank you for your contributions.

I'm reading all new comments so don't hesitate to post a question about the file. If I don't have the answer perhaps another user can help you.

No comments posted yet.

Leave a reply