plugins.exe is part of ??????????? V3.0.482.78 and developed by ????????????? according to the plugins.exe version information.
plugins.exe's description is "??????????? V3.0.482.78 Setup "
plugins.exe is usually located in the 'c:\downloads\' folder.
Some of the anti-virus scanners at VirusTotal detected plugins.exe.
If you have additional information about the file, please share it with the FreeFixer users by posting a comment at the bottom of this page.
The following is the available information on plugins.exe:
Property | Value |
---|---|
Product name | ??????????? V3.0.482.78 |
Company name | ????????????? |
File description | ??????????? V3.0.482.78 Setup |
Comments | ?????? Inno Setup ??? |
Legal copyright | ????.net |
Product version | 3.0.482.78 |
File version | 3.0.482.78 |
Here's a screenshot of the file properties when displayed by Windows Explorer:
Product name | ??????????? V3.0.482.78 .. |
Company name | ????????????? .. |
File description | ??????????? V3.0.482.78 Setup .. |
Comments | ?????? Inno Setup ??? |
Legal copyright | ????.net .. |
Product version | 3.0.482.78 |
File version | 3.0.482.78 |
plugins.exe is not signed.
36 of the 66 anti-virus programs at VirusTotal detected the plugins.exe file. That's a 55% detection rate.
Scanner | Detection Name |
---|---|
AegisLab | Trojan.Win32.Hesv.4!c |
Alibaba | Trojan:Win32/Hesv.5964c7f7 |
Arcabit | Trojan.Heur.iu0brLB9ZMgbb |
Avast | Win32:Malware-gen |
AVG | Win32:Malware-gen |
Avira | TR/Crypt.CFI.Gen |
Baidu | Win32.Trojan.Inject.ck |
BitDefender | Gen:Trojan.Heur.iu0brLB9ZMgbb |
Comodo | Malware@#3lb3lmdtzse8i |
Cybereason | malicious.db2d8c |
eGambit | Unsafe.AI_Score_79% |
Emsisoft | Gen:Trojan.Heur.iu0brLB9ZMgbb (B) |
F-Secure | Trojan.TR/Crypt.CFI.Gen |
FireEye | Gen:Trojan.Heur.iu0brLB9ZMgbb |
Fortinet | W32/Hesv.DTLR!tr |
GData | Gen:Trojan.Heur.iu0brLB9ZMgbb |
K7AntiVirus | Riskware ( 0040eff71 ) |
K7GW | Riskware ( 0040eff71 ) |
Kaspersky | Trojan.Win32.Hesv.dtlr |
Kingsoft | VIRUS_UNKNOWN |
MAX | malware (ai score=99) |
McAfee | Artemis!76001D7DB2D8 |
McAfee-GW-Edition | BehavesLike.Win32.BadFile.vc |
Microsoft | Trojan:Win32/Zpevdo.B |
MicroWorld-eScan | Gen:Trojan.Heur.iu0brLB9ZMgbb |
NANO-Antivirus | Trojan.Win32.Hesv.fkyilr |
Paloalto | generic.ml |
Qihoo-360 | Win32/Trojan.d52 |
Rising | Malware.Klone!8.15B3 (CLOUD) |
Sophos | Mal/Trickbot-E |
Symantec | Trojan.Gen.MBT |
Tencent | Win32.Trojan.Hesv.Aexk |
TrendMicro-HouseCall | TROJ_GEN.R002H0CDM19 |
ViRobot | Trojan.Win32.Z.Hesv.2963889 |
Yandex | Trojan.Startpage.ADPF |
ZoneAlarm | Trojan.Win32.Hesv.dtlr |
The following information was gathered by executing the file inside Cuckoo Sandbox.
Successfully executed process in sandbox.
{ "file_created": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_setup64.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-73FK9.tmp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_shfoldr.dll", "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_RegDLL.tmp" ], "directory_created": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-73FK9.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup" ], "dll_loaded": [ "UxTheme.dll", "ADVAPI32.dll", "C:\\Windows\\syswow64\\MSCTF.dll", "shell32.dll", "kernel32.dll", "uxtheme.dll", "OLEAUT32.dll", "C:\\Windows\\system32\\ole32.dll", "dwmapi.dll", "comctl32", "ole32.dll", "C:\\Windows\\system32\\uxtheme.dll", "OLEAUT32.DLL", "shfolder.dll", "comctl32.dll" ], "file_opened": [ "C:\\Windows\\System32\\imageres.dll", "C:\\Windows\\System32\\shell32.dll", "C:\\Windows\\Globalization\\Sorting\\sortdefault.nls", "C:\\Users\\cuck\\AppData\\Local\\Temp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.bin", "C:\\Windows\\System32\\netmsg.dll", "C:\\Windows\\SysWOW64\\en-US\\KERNELBASE.dll.mui" ], "regkey_opened": [ "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\NonEnum", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{8613E14C-D0C0-4161-AC0F-1DD2563286BC}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\ShellCompatibility\\Applications\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp", "HKEY_CLASSES_ROOT\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{0000897b-83df-4b96-be07-0fb58b01c4a4}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\CTF\\TIP\\{0000897b-83df-4b96-be07-0fb58b01c4a4}\\LanguageProfile\\0x00000000\\{0001bea3-ed56-483d-a2e2-aeae25577436}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{C1EE01F2-B3B6-4A6A-9DDD-E988C088EC82}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_CLASSES_ROOT\\Drive\\shellex\\FolderExtensions\\{fbeb8a05-beee-4442-804e-409d6c4515e9}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{F25E9F57-2FC8-4EB3-A41A-CCE5F08541E6}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{07EB03D6-B001-41DF-9192-BF9B841EE71F}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\KnownClasses", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{AE6BE008-07FB-400D-8BEB-337A64F7051F}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{E429B25A-E5D3-4D1F-9BE3-0C608477E3A1}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\uffbd\uffcc\uffd6\uffae\uffb3\ufff5\uffd4\uffda\uffcf\uffdf\uffbf\uffbc\uffca\uffd4\uffcf\uffb5\uffcd\uffb3\uffb2\uffe5\uffbc\ufffe V3.0.482.78_is1", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\", "HKEY_CLASSES_ROOT\\Drive\\shellex\\FolderExtensions", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{F89E9E58-BD2F-4008-9AC2-0F816C09F4EE}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{DCBD6FA8-032F-11D3-B5B1-00C04FC324A1}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{3697C5FA-60DD-4B56-92D4-74A569205C16}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\NonEnum", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{531FDEBF-9B4C-4A43-A2AA-960E8FCDC732}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\Compatibility\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Icons", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{A028AE76-01B1-46C2-99C4-ACD9858AE02F}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_CURRENT_USER\\Software\\Microsoft\\CTF\\DirectSwitchHotkeys", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{81D4E9C9-1D3B-41BC-9E6C-4B40BF79E35E}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{03B5835F-F03C-411B-9CE2-AA23E1171E36}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\uffbd\uffcc\uffd6\uffae\uffb3\ufff5\uffd4\uffda\uffcf\uffdf\uffbf\uffbc\uffca\uffd4\uffcf\uffb5\uffcd\uffb3\uffb2\uffe5\uffbc\ufffe V3.0.482.78_is1", "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{78CB5B0E-26ED-4FCC-854C-77E8F3D1AA80}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}" ], "file_written": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_setup64.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-73FK9.tmp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_shfoldr.dll", "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_RegDLL.tmp" ], "file_exists": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-73FK9.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp" ], "command_line": [ "\"C:\\Users\\cuck\\AppData\\Local\\Temp\\is-73FK9.tmp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp\" \/SL5=\"$1902E6,2711890,51712,C:\\Users\\cuck\\AppData\\Local\\Temp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.bin\" " ], "file_read": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.bin" ], "regkey_read": [ "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle\\Language Hotkey", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\QueryForOverlay", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\Attributes", "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle\\Hotkey", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\MapNetDriveVerbs", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{0000897b-83df-4b96-be07-0fb58b01c4a4}\\LanguageProfile\\0x00000000\\{0001bea3-ed56-483d-a2e2-aeae25577436}\\Enable", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\QueryForInfoTip", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\HideFolderVerbs", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\NonEnum\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\ProgramFilesDir", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\WantsParseDisplayName", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\CommonFilesDir", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\en-US", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\NoSetFolders", "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle\\Layout Hotkey", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\RegisteredOrganization", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\RegisteredOwner", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\WantsAliasedNotifications", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\NoFileFolderJunction", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\HasNavigationEnum", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\WantsFORDISPLAY", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\UseDropHandler", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\NoCommonGroups", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\CTF\\EnableAnchorContext", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\HideInWebView", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\RestrictedAttributes", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\HideOnDesktopPerUser", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\PinToNameSpaceTree", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\CommonFilesDir", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\NoPropertiesRecycleBin", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\en-US", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\CallForAttributes", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\NoPropertiesMyComputer", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\TurnOffSPIAnimations", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\NoControlPanel", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Drive\\shellex\\FolderExtensions\\{fbeb8a05-beee-4442-804e-409d6c4515e9}\\DriveMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\NoInternetIcon", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\WantsUniversalDelegate", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\ProgramFilesDir", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\WantsFORPARSING" ], "directory_enumerated": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-73FK9.tmp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp" ] }
[ { "yara": [], "sha1": "3e89ff837147c16b4e41c30d6c796374e0b8e62c", "name": "9884e9d1b4f8a873__shfoldr.dll", "filepath": "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_shfoldr.dll", "type": "PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "sha256": "9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87", "urls": [], "crc32": "AE2C3EC2", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/4080\/files\/9884e9d1b4f8a873__shfoldr.dll", "ssdeep": null, "size": 23312, "sha512": "9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3", "pids": [ 1676 ], "md5": "92dc6ef532fbb4a5c3201469a5b5eb63" }, { "yara": [], "sha1": "0dc9cf70ff66fe0bd9eaaca4593270464341a108", "name": "5200596d2349cd7f__regdll.tmp", "filepath": "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_RegDLL.tmp", "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "sha256": "5200596d2349cd7feb4dbd4c78eb7d67fe334838460a3c290575a4b3e4cc6633", "urls": [], "crc32": "8F6BD7E1", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/4080\/files\/5200596d2349cd7f__regdll.tmp", "ssdeep": null, "size": 4096, "sha512": "914bc2188002755a30b65eb437b25d343dc171dc0b9216757fe84fa940e307c8222dfe28315392f642e930d757115d7264615e29e70b8f4e5604b37c683c9cbe", "pids": [ 1676 ], "md5": "4248fa25d2f50ebe23ead46140933013" }, { "yara": [], "sha1": "efe32d504ce72f32e92dcf01aa2752b04d81a342", "name": "a4c86fc4836ac728__setup64.tmp", "filepath": "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_setup64.tmp", "type": "PE32+ executable (console) x86-64, for MS Windows", "sha256": "a4c86fc4836ac728d7bd96e7915090fd59521a9e74f1d06ef8e5a47c8695fd81", "urls": [], "crc32": "B1C5F7C5", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/4080\/files\/a4c86fc4836ac728__setup64.tmp", "ssdeep": null, "size": 6144, "sha512": "ba0469851438212d19906d6da8c4ae95ff1c0711a095d9f21f13530a6b8b21c3acbb0ff55edb8a35b41c1a9a342f5d3421c00ba395bc13bb1ef5902b979ce824", "pids": [ 1676 ], "md5": "4ff75f505fddcc6a9ae62216446205d9" }, { "yara": [], "sha1": "186370d5438b1f5f3d75891aa8412e8edd00981c", "name": "86ac18632bfdca02_b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp", "filepath": "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-73FK9.tmp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp", "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "sha256": "86ac18632bfdca026df9fe12a1d4df2de64bbdc1d2d7e42d2dcbf7809cbbebb3", "urls": [ "http:\/\/www.remobjects.com\/ps", "http:\/\/www.innosetup.com\/" ], "crc32": "FEC198B6", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/4080\/files\/86ac18632bfdca02_b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp", "ssdeep": null, "size": 723456, "sha512": "fb868c629cd0255b7620c9260bb5712b6622f53f0b7de3d6125c295e02d16f03584ce3a90eccb02b65ce9825885aa1bca5f68c7cc09dc0c09e7c208fcef54714", "pids": [ 1268 ], "md5": "1a6c2b578c69b9388e22d38afa16a7fb" } ]
[ { "process_path": "C:\\Windows\\System32\\lsass.exe", "process_name": "lsass.exe", "pid": 476, "summary": {}, "first_seen": 1575654789.328125, "ppid": 376 }, { "process_path": "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-73FK9.tmp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp", "process_name": "b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp", "pid": 1676, "summary": { "file_created": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_setup64.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_shfoldr.dll", "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_RegDLL.tmp" ], "directory_created": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup" ], "dll_loaded": [ "UxTheme.dll", "ADVAPI32.dll", "C:\\Windows\\syswow64\\MSCTF.dll", "shell32.dll", "kernel32.dll", "uxtheme.dll", "OLEAUT32.dll", "C:\\Windows\\system32\\ole32.dll", "dwmapi.dll", "comctl32", "ole32.dll", "OLEAUT32.DLL", "shfolder.dll", "comctl32.dll" ], "file_opened": [ "C:\\Windows\\System32\\imageres.dll", "C:\\Windows\\System32\\shell32.dll", "C:\\Windows\\Globalization\\Sorting\\sortdefault.nls", "C:\\Users\\cuck\\AppData\\Local\\Temp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.bin", "C:\\Windows\\System32\\netmsg.dll", "C:\\Windows\\SysWOW64\\en-US\\KERNELBASE.dll.mui" ], "regkey_opened": [ "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\NonEnum", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{8613E14C-D0C0-4161-AC0F-1DD2563286BC}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\ShellCompatibility\\Applications\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp", "HKEY_CLASSES_ROOT\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{0000897b-83df-4b96-be07-0fb58b01c4a4}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\CTF\\TIP\\{0000897b-83df-4b96-be07-0fb58b01c4a4}\\LanguageProfile\\0x00000000\\{0001bea3-ed56-483d-a2e2-aeae25577436}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{C1EE01F2-B3B6-4A6A-9DDD-E988C088EC82}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_CLASSES_ROOT\\Drive\\shellex\\FolderExtensions\\{fbeb8a05-beee-4442-804e-409d6c4515e9}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{F25E9F57-2FC8-4EB3-A41A-CCE5F08541E6}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{07EB03D6-B001-41DF-9192-BF9B841EE71F}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\KnownClasses", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{AE6BE008-07FB-400D-8BEB-337A64F7051F}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{E429B25A-E5D3-4D1F-9BE3-0C608477E3A1}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\uffbd\uffcc\uffd6\uffae\uffb3\ufff5\uffd4\uffda\uffcf\uffdf\uffbf\uffbc\uffca\uffd4\uffcf\uffb5\uffcd\uffb3\uffb2\uffe5\uffbc\ufffe V3.0.482.78_is1", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\", "HKEY_CLASSES_ROOT\\Drive\\shellex\\FolderExtensions", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{F89E9E58-BD2F-4008-9AC2-0F816C09F4EE}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{DCBD6FA8-032F-11D3-B5B1-00C04FC324A1}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{3697C5FA-60DD-4B56-92D4-74A569205C16}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\NonEnum", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{531FDEBF-9B4C-4A43-A2AA-960E8FCDC732}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\Compatibility\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Icons", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{A028AE76-01B1-46C2-99C4-ACD9858AE02F}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_CURRENT_USER\\Software\\Microsoft\\CTF\\DirectSwitchHotkeys", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{81D4E9C9-1D3B-41BC-9E6C-4B40BF79E35E}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{03B5835F-F03C-411B-9CE2-AA23E1171E36}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\uffbd\uffcc\uffd6\uffae\uffb3\ufff5\uffd4\uffda\uffcf\uffdf\uffbf\uffbc\uffca\uffd4\uffcf\uffb5\uffcd\uffb3\uffb2\uffe5\uffbc\ufffe V3.0.482.78_is1", "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{78CB5B0E-26ED-4FCC-854C-77E8F3D1AA80}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}" ], "file_written": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_setup64.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_shfoldr.dll", "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_RegDLL.tmp" ], "file_exists": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp" ], "file_read": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.bin" ], "regkey_read": [ "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle\\Language Hotkey", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\QueryForOverlay", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\Attributes", "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle\\Hotkey", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\MapNetDriveVerbs", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{0000897b-83df-4b96-be07-0fb58b01c4a4}\\LanguageProfile\\0x00000000\\{0001bea3-ed56-483d-a2e2-aeae25577436}\\Enable", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\QueryForInfoTip", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\HideFolderVerbs", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\NonEnum\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\ProgramFilesDir", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\WantsParseDisplayName", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\CommonFilesDir", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\en-US", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\NoSetFolders", "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle\\Layout Hotkey", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\RegisteredOrganization", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\RegisteredOwner", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\WantsAliasedNotifications", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\NoFileFolderJunction", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\HasNavigationEnum", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\WantsFORDISPLAY", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\UseDropHandler", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\NoCommonGroups", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\CTF\\EnableAnchorContext", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\HideInWebView", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\RestrictedAttributes", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\HideOnDesktopPerUser", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\PinToNameSpaceTree", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\CommonFilesDir", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\NoPropertiesRecycleBin", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\en-US", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\CallForAttributes", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\NoPropertiesMyComputer", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\TurnOffSPIAnimations", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\NoControlPanel", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Drive\\shellex\\FolderExtensions\\{fbeb8a05-beee-4442-804e-409d6c4515e9}\\DriveMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\NoInternetIcon", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\WantsUniversalDelegate", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\ProgramFilesDir", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\ShellFolder\\WantsFORPARSING" ], "directory_enumerated": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-73FK9.tmp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp" ] }, "first_seen": 1575654789.859375, "ppid": 1268 }, { "process_path": "C:\\Users\\cuck\\AppData\\Local\\Temp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.bin", "process_name": "b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.bin", "pid": 1268, "summary": { "file_created": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-73FK9.tmp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp" ], "directory_created": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-73FK9.tmp" ], "dll_loaded": [ "dwmapi.dll", "kernel32.dll", "UxTheme.dll", "shell32.dll", "comctl32.dll", "C:\\Windows\\system32\\uxtheme.dll" ], "file_opened": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.bin", "C:\\Windows\\SysWOW64\\en-US\\KERNELBASE.dll.mui", "C:\\Windows\\System32\\netmsg.dll", "C:\\Windows\\Globalization\\Sorting\\sortdefault.nls" ], "command_line": [ "\"C:\\Users\\cuck\\AppData\\Local\\Temp\\is-73FK9.tmp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp\" \/SL5=\"$1902E6,2711890,51712,C:\\Users\\cuck\\AppData\\Local\\Temp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.bin\" " ], "file_written": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-73FK9.tmp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp" ], "file_exists": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-73FK9.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp" ], "file_read": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.bin" ], "regkey_read": [ "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\en-US", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\en-US" ] }, "first_seen": 1575654789.640625, "ppid": 2676 } ]
[ { "markcount": 1, "families": [], "description": "Checks if process is being debugged by a debugger", "severity": 1, "marks": [ { "call": { "category": "system", "status": 0, "stacktrace": [], "last_error": 0, "nt_status": -1073741772, "api": "IsDebuggerPresent", "return_value": 0, "arguments": {}, "time": 1575654789.781625, "tid": 2740, "flags": {} }, "pid": 1268, "type": "call", "cid": 257 } ], "references": [], "name": "checks_debugger" }, { "markcount": 3, "families": [], "description": "The executable contains unknown PE section names indicative of a packer (could be a false positive)", "severity": 1, "marks": [ { "category": "section", "ioc": "CODE", "type": "ioc", "description": null }, { "category": "section", "ioc": "DATA", "type": "ioc", "description": null }, { "category": "section", "ioc": "BSS", "type": "ioc", "description": null } ], "references": [], "name": "pe_features" }, { "markcount": 4, "families": [], "description": "Allocates read-write-execute memory (usually to unpack itself)", "severity": 2, "marks": [ { "call": { "category": "process", "status": 1, "stacktrace": [], "api": "NtProtectVirtualMemory", "return_value": 0, "arguments": { "process_identifier": 1268, "stack_dep_bypass": 0, "stack_pivoted": 0, "heap_dep_bypass": 0, "length": 4096, "protection": 64, "process_handle": "0xffffffff", "base_address": "0x00400000" }, "time": 1575654789.719625, "tid": 2740, "flags": { "protection": "PAGE_EXECUTE_READWRITE" } }, "pid": 1268, "type": "call", "cid": 67 }, { "call": { "category": "process", "status": 1, "stacktrace": [], "api": "NtProtectVirtualMemory", "return_value": 0, "arguments": { "process_identifier": 1268, "stack_dep_bypass": 0, "stack_pivoted": 0, "heap_dep_bypass": 0, "length": 40960, "protection": 64, "process_handle": "0xffffffff", "base_address": "0x00401000" }, "time": 1575654789.719625, "tid": 2740, "flags": { "protection": "PAGE_EXECUTE_READWRITE" } }, "pid": 1268, "type": "call", "cid": 69 }, { "call": { "category": "process", "status": 1, "stacktrace": [], "api": "NtProtectVirtualMemory", "return_value": 0, "arguments": { "process_identifier": 1268, "stack_dep_bypass": 0, "stack_pivoted": 0, "heap_dep_bypass": 0, "length": 20480, "protection": 64, "process_handle": "0xffffffff", "base_address": "0x0040f000" }, "time": 1575654789.734625, "tid": 2740, "flags": { "protection": "PAGE_EXECUTE_READWRITE" } }, "pid": 1268, "type": "call", "cid": 71 }, { "call": { "category": "process", "status": 1, "stacktrace": [], "api": "NtAllocateVirtualMemory", "return_value": 0, "arguments": { "process_identifier": 1676, "region_size": 4096, "stack_dep_bypass": 0, "stack_pivoted": 0, "heap_dep_bypass": 0, "protection": 64, "process_handle": "0xffffffff", "allocation_type": 4096, "base_address": "0x01dc0000" }, "time": 1575654789.969375, "tid": 2872, "flags": { "protection": "PAGE_EXECUTE_READWRITE", "allocation_type": "MEM_COMMIT" } }, "pid": 1676, "type": "call", "cid": 95 } ], "references": [], "name": "allocates_rwx" }, { "markcount": 2, "families": [], "description": "Foreign language identified in PE resource", "severity": 2, "marks": [ { "name": "RT_VERSION", "language": "LANG_CHINESE", "offset": "0x00012b08", "filetype": "data", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000488" }, { "name": "RT_MANIFEST", "language": "LANG_CHINESE", "offset": "0x00012f90", "filetype": "XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000462" } ], "references": [], "name": "origin_langid" }, { "markcount": 3, "families": [], "description": "Drops an executable to the user AppData folder", "severity": 2, "marks": [ { "category": "file", "ioc": "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_shfoldr.dll", "type": "ioc", "description": null }, { "category": "file", "ioc": "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-24O33.tmp\\_isetup\\_RegDLL.tmp", "type": "ioc", "description": null }, { "category": "file", "ioc": "C:\\Users\\cuck\\AppData\\Local\\Temp\\is-73FK9.tmp\\b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542.tmp", "type": "ioc", "description": null } ], "references": [], "name": "exe_appdata" }, { "markcount": 2, "families": [], "description": "Queries for potentially installed applications", "severity": 2, "marks": [ { "call": { "category": "registry", "status": 0, "stacktrace": [], "last_error": 0, "nt_status": -1073741772, "api": "RegOpenKeyExA", "return_value": 2, "arguments": { "access": "0x00000001", "base_handle": "0x80000001", "key_handle": "0x00000000", "regkey": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\uffbd\uffcc\uffd6\uffae\uffb3\ufff5\uffd4\uffda\uffcf\uffdf\uffbf\uffbc\uffca\uffd4\uffcf\uffb5\uffcd\uffb3\uffb2\uffe5\uffbc\ufffe V3.0.482.78_is1", "regkey_r": "Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\u00bd\u00cc\u00d6\u00ae\u00b3\u00f5\u00d4\u00da\u00cf\u00df\u00bf\u00bc\u00ca\u00d4\u00cf\u00b5\u00cd\u00b3\u00b2\u00e5\u00bc\u00fe V3.0.482.78_is1", "options": 0 }, "time": 1575654790.328375, "tid": 2872, "flags": {} }, "pid": 1676, "type": "call", "cid": 1347 }, { "call": { "category": "registry", "status": 0, "stacktrace": [], "last_error": 0, "nt_status": -1073741772, "api": "RegOpenKeyExA", "return_value": 2, "arguments": { "access": "0x00000001", "base_handle": "0x80000002", "key_handle": "0x00000000", "regkey": "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\uffbd\uffcc\uffd6\uffae\uffb3\ufff5\uffd4\uffda\uffcf\uffdf\uffbf\uffbc\uffca\uffd4\uffcf\uffb5\uffcd\uffb3\uffb2\uffe5\uffbc\ufffe V3.0.482.78_is1", "regkey_r": "Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\u00bd\u00cc\u00d6\u00ae\u00b3\u00f5\u00d4\u00da\u00cf\u00df\u00bf\u00bc\u00ca\u00d4\u00cf\u00b5\u00cd\u00b3\u00b2\u00e5\u00bc\u00fe V3.0.482.78_is1", "options": 0 }, "time": 1575654790.328375, "tid": 2872, "flags": {} }, "pid": 1676, "type": "call", "cid": 1348 } ], "references": [], "name": "queries_programs" } ]
The Yara rules did not detect anything in the file.
{ "tls": [], "udp": [ { "src": "192.168.56.101", "dst": "192.168.56.255", "offset": 546, "time": 3.078904867172241, "dport": 137, "sport": 137 }, { "src": "192.168.56.101", "dst": "192.168.56.255", "offset": 5226, "time": 9.078285932540894, "dport": 138, "sport": 138 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 7070, "time": 3.011863946914673, "dport": 5355, "sport": 51001 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 7398, "time": 1.0190410614013672, "dport": 5355, "sport": 53595 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 7726, "time": 3.01944899559021, "dport": 5355, "sport": 53848 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 8054, "time": 1.5206429958343506, "dport": 5355, "sport": 54255 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 8382, "time": -0.10412907600402832, "dport": 5355, "sport": 55314 }, { "src": "192.168.56.101", "dst": "239.255.255.250", "offset": 8710, "time": 1.5489940643310547, "dport": 1900, "sport": 1900 }, { "src": "192.168.56.101", "dst": "239.255.255.250", "offset": 28120, "time": 1.0545320510864258, "dport": 3702, "sport": 49152 }, { "src": "192.168.56.101", "dst": "239.255.255.250", "offset": 36504, "time": 3.125316858291626, "dport": 1900, "sport": 53598 } ], "dns_servers": [], "http": [], "icmp": [], "smtp": [], "tcp": [], "smtp_ex": [], "mitm": [], "hosts": [], "pcap_sha256": "f6e58caad1f38862b4b4b42eae3d6df8fef3e4e7ce5dadd7d69e4dd986cc7890", "dns": [], "http_ex": [], "domains": [], "dead_hosts": [], "sorted_pcap_sha256": "03efecde91165b8b3bb56d19ad41cc41688acaa6fbcdf064a81e5ccc7354f1a1", "irc": [], "https_ex": [] }
The instructions below shows how to remove plugins.exe with help from the FreeFixer removal tool. Basically, you install FreeFixer, scan your computer, check the plugins.exe file for removal, restart your computer and scan it again to verify that plugins.exe has been successfully removed. Here are the removal instructions in more detail:
Property | Value |
---|---|
MD5 | 76001d7db2d8c586bcf34bd6a6d11b6c |
SHA256 | b9f7796ee6590a910d61318b110cbf3b72fdcea275234ffb71b0b5365e751542 |
These are some of the error messages that can appear related to plugins.exe:
plugins.exe has encountered a problem and needs to close. We are sorry for the inconvenience.
plugins.exe - Application Error. The instruction at "0xXXXXXXXX" referenced memory at "0xXXXXXXXX". The memory could not be "read/written". Click on OK to terminate the program.
??????????? V3.0.482.78 Setup has stopped working.
End Program - plugins.exe. This program is not responding.
plugins.exe is not a valid Win32 application.
plugins.exe - Application Error. The application failed to initialize properly (0xXXXXXXXX). Click OK to terminate the application.
To help other users, please let us know what you will do with plugins.exe:
Please share with the other users what you think about this file. What does this file do? Is it legitimate or something that your computer is better without? Do you know how it was installed on your system? Did you install it yourself or did it come bundled with some other software? Is it running smoothly or do you get some error message? Any information that will help to document this file is welcome. Thank you for your contributions.
I'm reading all new comments so don't hesitate to post a question about the file. If I don't have the answer perhaps another user can help you.
No comments posted yet.