tplink@154_82259.exe is part of ?????.exe according to the tplink@154_82259.exe version information.
tplink@154_82259.exe's description is "?????"
tplink@154_82259.exe is digitally signed by Anhui OneTwoThree Network Technology Co., Ltd..
tplink@154_82259.exe is usually located in the 'c:\downloads\' folder.
Some of the anti-virus scanners at VirusTotal detected tplink@154_82259.exe.
If you have additional information about the file, please share it with the FreeFixer users by posting a comment at the bottom of this page.
The following is the available information on tplink@154_82259.exe:
Property | Value |
---|---|
Product name | ?????.exe |
File description | ????? |
Internal name | ?????.exe |
Original filename | ?????.exe |
Legal copyright | Copyright (C) 2018 |
Product version | 2.2.1.207 |
File version | 2.2.1.207 |
Here's a screenshot of the file properties when displayed by Windows Explorer:
Product name | ?????.exe |
File description | ????? |
Internal name | ?????.exe |
Original filename | ?????.exe |
Legal copyright | Copyright (C) 2018 |
Product version | 2.2.1.207 |
File version | 2.2.1.207 |
tplink@154_82259.exe has a valid digital signature.
Property | Value |
---|---|
Signer name | Anhui OneTwoThree Network Technology Co., Ltd. |
Certificate issuer name | Symantec Class 3 Extended Validation Code Signing CA - G2 |
Certificate serial number | 5e5f66926c90c7540cee28b3991a3540 |
49 of the 67 anti-virus programs at VirusTotal detected the tplink@154_82259.exe file. That's a 73% detection rate.
Scanner | Detection Name |
---|---|
Ad-Aware | Trojan.GenericKD.31140590 |
AhnLab-V3 | PUP/Win32.Qiwmonk.C2173910 |
Alibaba | AdWare:Win32/Generic.99f2468d |
ALYac | Trojan.GenericKD.31140590 |
Antiy-AVL | Trojan/Win32.TSGeneric |
Arcabit | Trojan.Generic.D1DB2AEE |
Avast | Win32:Adware-gen [Adw] |
AVG | Win32:Adware-gen [Adw] |
Avira | HEUR/AGEN.1029657 |
BitDefender | Trojan.GenericKD.31140590 |
CAT-QuickHeal | Trojan.SnojanPMF.S3119681 |
ClamAV | Win.Trojan.Agent-6458772-0 |
Comodo | ApplicUnwnt@#3kzh7mwx1aj03 |
CrowdStrike | win/malicious_confidence_70% (D) |
Cybereason | malicious.77e9c1 |
Cyren | W32/Trojan.ZWCU-1074 |
DrWeb | Adware.Qjwmonkey.135 |
Emsisoft | Trojan.GenericKD.31140590 (B) |
Endgame | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Adware.Qjwmonkey.G |
F-Prot | W32/Qjwmonkey.B.gen!Eldorado |
FireEye | Generic.mg.cf517d077e9c1521 |
Fortinet | Riskware/Qjwmonkey |
GData | Trojan.GenericKD.31140590 |
Ikarus | PUA.Qjwmonkey |
Invincea | heuristic |
Jiangmin | Downloader.Generic.myd |
K7AntiVirus | Adware ( 00510c5c1 ) |
K7GW | Adware ( 00510c5c1 ) |
Kaspersky | not-a-virus:Downloader.Win32.Snojan.fmmu |
Malwarebytes | Trojan.MalPack.PS |
MAX | malware (ai score=100) |
McAfee | PUP-XEG-GE |
McAfee-GW-Edition | PUP-XEG-GE |
Microsoft | BrowserModifier:Win32/Qiwmonk |
MicroWorld-eScan | Trojan.GenericKD.31140590 |
NANO-Antivirus | Trojan.Win32.Snojan.exxrav |
Paloalto | generic.ml |
Panda | Trj/Genetic.gen |
Rising | Malware.Qiwmonk!8.E93B (CLOUD) |
SentinelOne | DFI - Malicious PE |
Sophos | QjMonkey (PUA) |
SUPERAntiSpyware | Adware.Qjwmonkey/Variant |
TrendMicro-HouseCall | PUA_QIWMONKEY |
VBA32 | Adware.Qjwmonkey |
ViRobot | Adware.Qjwmonkey.1280136.N |
Yandex | PUA.Downloader! |
Zillya | Adware.Qjwmonkey.Win32.375 |
ZoneAlarm | not-a-virus:Downloader.Win32.Snojan.fmmu |
The following information was gathered by executing the file inside Cuckoo Sandbox.
Successfully executed process in sandbox.
{ "file_created": [ "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db" ], "regkey_written": [ "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableFileTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\MaxFileSize", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileDirectory", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableConsoleTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\ConsoleTracingMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileTracingMask" ], "dll_loaded": [ "urlmon.dll", "DNSAPI.dll", "kernel32.dll", "dwmapi.dll", "C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\\gdiplus.dll", "cryptsp.dll", "winhttp.dll", "C:\\Windows\\system32\\secur32.dll", "API-MS-WIN-Service-Management-L1-1-0.dll", "SspiCli.dll", "SHLWAPI.dll", "credssp.dll", "API-MS-WIN-Service-winsvc-L1-1-0.dll", "rtutils.dll", "Iphlpapi.dll", "WINTRUST.dll", "WindowsCodecs.dll", "RPCRT4.dll", "C:\\Windows\\System32\\wship6.dll", "Urlmon.dll", "C:\\Windows\\system32\\iphlpapi.dll", "C:\\Windows\\system32\\mswsock.dll", "ADVAPI32.dll", "rpcrt4.dll", "C:\\Windows\\System32\\wshtcpip.dll", "WS2_32.dll" ], "file_opened": [ "C:\\Windows\\Fonts\\staticcache.dat", "C:\\Users\\cuck\\AppData\\Local\\Temp\\f5a644a7aefd863f0a2d114da6a631726631e96ea0752a8c5505aca2135646be.bin", "\\??\\PhysicalDrive0" ], "regkey_opened": [ "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\LsaExtensionConfig\\SspiCli", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings", "HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows NT\\Rpc", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}\\{EF381EA0-4D07-418D-A490-68AF67CE948B}\\Connection", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Video\\{6FABAC3A-B3E4-4C2F-82E9-AA53D01C5093}\\0000", "HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Shell.Explorer\\CLSID", "HKEY_CLASSES_ROOT\\FirefoxURL-E7CF176E110C211B\\shell\\open\\command\\", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontLink\\SystemLink", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip6", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing\\RASAPI32", "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Winsock\\Setup Migration\\Providers", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Rpc", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\SecurityProviders\\SaslProfiles", "HKEY_LOCAL_MACHINE\\System\\Setup", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback", "HKEY_CLASSES_ROOT\\CLSID\\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\\Instance\\Disabled", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Shell\\Associations\\UrlAssociations\\http\\UserChoice\\", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\Tracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\Tcpip\\Parameters\\Winsock", "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Winsock\\Parameters", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\DirectDraw\\GammaCalibrator", "HKEY_CURRENT_USER\\Shell.Explorer", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\msasn1", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\SecurityProviders", "HKEY_CLASSES_ROOT\\CLSID\\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\\Instance", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\Tcpip6\\Parameters\\Winsock", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Lsa\\SspiCache", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0" ], "resolves_host": [ "api.baizhu.cc" ], "file_written": [ "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db" ], "file_exists": [ "C:\\Windows\\System32\\C_936.NLS" ], "mutex": [ "Local\\__DDrawExclMode__", "ATL:MemData03EACUCKPC", "Local\\__DDrawCheckExclMode__" ], "file_failed": [ "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db" ], "guid": [ "{8856f961-340a-11d0-a96b-00c04fd705a2}", "{00000000-0000-0000-c000-000000000046}" ], "file_read": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\f5a644a7aefd863f0a2d114da6a631726631e96ea0752a8c5505aca2135646be.bin", "C:\\Windows\\Fonts\\staticcache.dat" ], "regkey_read": [ "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\ca", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Rpc\\MaxRpcSize", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Shell\\Associations\\UrlAssociations\\http\\UserChoice\\Progid", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\UseDelayedAcceptance", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0\\DataFilePath", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableConsoleTracing", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\SecurityProviders\\SecurityProviders", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}\\{EF381EA0-4D07-418D-A490-68AF67CE948B}\\Connection\\MediaSubType", "HKEY_LOCAL_MACHINE\\SYSTEM\\Setup\\SystemSetupInProgress", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\zh-CN", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\ca-ES", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\bg", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileTracingMask", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\bg", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\ar-SA", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\bg-BG", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Language Groups\\1", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\EnableConsoleTracing", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\ar", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\zh-Hans", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane10", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane11", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane12", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane13", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane14", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane15", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane16", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\ar-SA", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Parameters\\Transports", "HKEY_CURRENT_USER\\FirefoxURL-E7CF176E110C211B\\shell\\open\\command\\(Default)", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Locale\\00000409", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\ForceDriverFlagsOff", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileDirectory", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Type", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Comment", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\MaxFileSize", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane4", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\zh-Hans", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableFileTracing", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\HelperDllName", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip6\\WinSock 2.0 Provider ID", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\Mapping", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane14", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane15", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\UseDelayedAcceptance", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Video\\{6FABAC3A-B3E4-4C2F-82E9-AA53D01C5093}\\0000\\InstalledDisplayDrivers", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane10", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\ConsoleTracingMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane12", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane13", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\zh-CN", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane8", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\LsaExtensionConfig\\SspiCli\\CheckSignatureRoutine", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\Drivers\\SoftwareOnly", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane6", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane7", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\MinSockaddrLength", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane5", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane2", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane3", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane1", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\bg-BG", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\ca-ES", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane9", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\MinSockaddrLength", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\LsaExtensionConfig\\SspiCli\\CheckSignatureDll", "HKEY_LOCAL_MACHINE\\SYSTEM\\Setup\\OOBEInProgress", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Name", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\MaxSockaddrLength", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\MaxSockaddrLength", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\HelperDllName", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\LoadDebugRuntime", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Security_HKLM_only", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\TokenSize", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane16", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Capabilities", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Shell.Explorer\\CLSID\\(Default)", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0\\Disable", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip\\WinSock 2.0 Provider ID", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ShareCredsWithWinHttp", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\Tracing\\Enabled", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\ar", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\GRE_Initialize\\DisableMetaFiles", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane8", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane9", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane6", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane7", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane4", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane5", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane2", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane3", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane1", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CodePage\\936", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\DisableBranchCache", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\SQMClient\\Windows\\CEIPEnable", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\RpcId", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\ComputerName\\ActiveComputerName\\ComputerName", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\DisableImprovedZoneCheck", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane11", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\Mapping", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\ca", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Version" ] }
[ { "yara": [], "sha1": "fde8eef8b2254a474ff7ea04e0642039805d9b0a", "name": "da8c1150075f581b_globalmgr.db", "filepath": "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db", "type": "ASCII text, with CRLF line terminators", "sha256": "da8c1150075f581b315515290ca8b9d5d18ff897162887a5620669cd92ae7b77", "urls": [], "crc32": "C29EDCC0", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/6027\/files\/da8c1150075f581b_globalmgr.db", "ssdeep": null, "size": 190, "sha512": "1c72f4402a76a88e615f2c16ab9251794e8d4d9a73b3503033cadabcb428e0b196ddccd662c1df73d854bedeec93aeab55e0368f4ab6e85c37c875535c88723b", "pids": [ 2660 ], "md5": "b2305cb44a0de0d0aa30986c80949a48" } ]
[ { "process_path": "C:\\Windows\\System32\\lsass.exe", "process_name": "lsass.exe", "pid": 476, "summary": {}, "first_seen": 1583992386.390625, "ppid": 376 }, { "process_path": "C:\\Users\\cuck\\AppData\\Local\\Temp\\f5a644a7aefd863f0a2d114da6a631726631e96ea0752a8c5505aca2135646be.bin", "process_name": "f5a644a7aefd863f0a2d114da6a631726631e96ea0752a8c5505aca2135646be.bin", "pid": 2660, "summary": { "file_created": [ "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db" ], "regkey_written": [ "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableFileTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\MaxFileSize", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileDirectory", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableConsoleTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\ConsoleTracingMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileTracingMask" ], "dll_loaded": [ "urlmon.dll", "DNSAPI.dll", "kernel32.dll", "dwmapi.dll", "C:\\Windows\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\\gdiplus.dll", "cryptsp.dll", "winhttp.dll", "C:\\Windows\\system32\\secur32.dll", "API-MS-WIN-Service-Management-L1-1-0.dll", "SspiCli.dll", "SHLWAPI.dll", "credssp.dll", "API-MS-WIN-Service-winsvc-L1-1-0.dll", "rtutils.dll", "Iphlpapi.dll", "WINTRUST.dll", "WindowsCodecs.dll", "RPCRT4.dll", "C:\\Windows\\System32\\wship6.dll", "Urlmon.dll", "C:\\Windows\\system32\\iphlpapi.dll", "C:\\Windows\\system32\\mswsock.dll", "ADVAPI32.dll", "rpcrt4.dll", "C:\\Windows\\System32\\wshtcpip.dll", "WS2_32.dll" ], "file_opened": [ "C:\\Windows\\Fonts\\staticcache.dat", "C:\\Users\\cuck\\AppData\\Local\\Temp\\f5a644a7aefd863f0a2d114da6a631726631e96ea0752a8c5505aca2135646be.bin", "\\??\\PhysicalDrive0" ], "regkey_opened": [ "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\LsaExtensionConfig\\SspiCli", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings", "HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows NT\\Rpc", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}\\{EF381EA0-4D07-418D-A490-68AF67CE948B}\\Connection", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Video\\{6FABAC3A-B3E4-4C2F-82E9-AA53D01C5093}\\0000", "HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Shell.Explorer\\CLSID", "HKEY_CLASSES_ROOT\\FirefoxURL-E7CF176E110C211B\\shell\\open\\command\\", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontLink\\SystemLink", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip6", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing\\RASAPI32", "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Winsock\\Setup Migration\\Providers", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Rpc", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\SecurityProviders\\SaslProfiles", "HKEY_LOCAL_MACHINE\\System\\Setup", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback", "HKEY_CLASSES_ROOT\\CLSID\\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\\Instance\\Disabled", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Shell\\Associations\\UrlAssociations\\http\\UserChoice\\", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\Tracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\Tcpip\\Parameters\\Winsock", "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Winsock\\Parameters", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\DirectDraw\\GammaCalibrator", "HKEY_CURRENT_USER\\Shell.Explorer", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\msasn1", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\SecurityProviders", "HKEY_CLASSES_ROOT\\CLSID\\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\\Instance", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\Tcpip6\\Parameters\\Winsock", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Lsa\\SspiCache", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0" ], "resolves_host": [ "api.baizhu.cc" ], "file_written": [ "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db" ], "file_exists": [ "C:\\Windows\\System32\\C_936.NLS" ], "mutex": [ "Local\\__DDrawExclMode__", "ATL:MemData03EACUCKPC", "Local\\__DDrawCheckExclMode__" ], "file_failed": [ "C:\\Users\\cuck\\AppData\\Roaming\\GlobalMgr.db" ], "guid": [ "{8856f961-340a-11d0-a96b-00c04fd705a2}", "{00000000-0000-0000-c000-000000000046}" ], "file_read": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\f5a644a7aefd863f0a2d114da6a631726631e96ea0752a8c5505aca2135646be.bin", "C:\\Windows\\Fonts\\staticcache.dat" ], "regkey_read": [ "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\ca", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Rpc\\MaxRpcSize", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Shell\\Associations\\UrlAssociations\\http\\UserChoice\\Progid", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\UseDelayedAcceptance", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0\\DataFilePath", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableConsoleTracing", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\SecurityProviders\\SecurityProviders", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}\\{EF381EA0-4D07-418D-A490-68AF67CE948B}\\Connection\\MediaSubType", "HKEY_LOCAL_MACHINE\\SYSTEM\\Setup\\SystemSetupInProgress", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\zh-CN", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\ca-ES", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\bg", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileTracingMask", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\bg", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\ar-SA", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\bg-BG", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Language Groups\\1", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\EnableConsoleTracing", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\ar", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\zh-Hans", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane10", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane11", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane12", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane13", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane14", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane15", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane16", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\ar-SA", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Parameters\\Transports", "HKEY_CURRENT_USER\\FirefoxURL-E7CF176E110C211B\\shell\\open\\command\\(Default)", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Locale\\00000409", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\ForceDriverFlagsOff", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileDirectory", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Type", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Comment", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\MaxFileSize", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane4", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\zh-Hans", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableFileTracing", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\HelperDllName", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip6\\WinSock 2.0 Provider ID", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\Mapping", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane14", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane15", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\UseDelayedAcceptance", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Video\\{6FABAC3A-B3E4-4C2F-82E9-AA53D01C5093}\\0000\\InstalledDisplayDrivers", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane10", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\ConsoleTracingMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane12", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane13", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\zh-CN", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane8", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\LsaExtensionConfig\\SspiCli\\CheckSignatureRoutine", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\Drivers\\SoftwareOnly", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane6", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane7", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\MinSockaddrLength", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane5", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane2", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane3", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane1", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\bg-BG", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\ca-ES", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane9", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\MinSockaddrLength", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\LsaExtensionConfig\\SspiCli\\CheckSignatureDll", "HKEY_LOCAL_MACHINE\\SYSTEM\\Setup\\OOBEInProgress", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Name", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\MaxSockaddrLength", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\MaxSockaddrLength", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Winsock\\HelperDllName", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Direct3D\\LoadDebugRuntime", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Security_HKLM_only", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\TokenSize", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane16", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Capabilities", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Shell.Explorer\\CLSID\\(Default)", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0\\Disable", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winsock\\Setup Migration\\Providers\\Tcpip\\WinSock 2.0 Provider ID", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ShareCredsWithWinHttp", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\Tracing\\Enabled", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\ar", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\GRE_Initialize\\DisableMetaFiles", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane8", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane9", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane6", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane7", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane4", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane5", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane2", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane3", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\Plane1", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CodePage\\936", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\WinHttp\\DisableBranchCache", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\SQMClient\\Windows\\CEIPEnable", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\RpcId", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\ComputerName\\ActiveComputerName\\ComputerName", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\DisableImprovedZoneCheck", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\SimSun\\Plane11", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\TCPIP6\\Parameters\\Winsock\\Mapping", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\ca", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\SspiCache\\credssp.dll\\Version" ] }, "first_seen": 1583992386.640625, "ppid": 1624 } ]
[ { "markcount": 1, "families": [], "description": "Queries for the computername", "severity": 1, "marks": [ { "call": { "category": "misc", "status": 1, "stacktrace": [], "api": "GetComputerNameW", "return_value": 1, "arguments": { "computer_name": "CUCKPC" }, "time": 1583992386.812625, "tid": 2308, "flags": {} }, "pid": 2660, "type": "call", "cid": 125 } ], "references": [], "name": "antivm_queries_computername" }, { "markcount": 1, "families": [], "description": "Checks if process is being debugged by a debugger", "severity": 1, "marks": [ { "call": { "category": "system", "status": 0, "stacktrace": [], "last_error": 0, "nt_status": -1073741772, "api": "IsDebuggerPresent", "return_value": 0, "arguments": {}, "time": 1583992386.812625, "tid": 2308, "flags": {} }, "pid": 2660, "type": "call", "cid": 154 } ], "references": [], "name": "checks_debugger" }, { "markcount": 1, "families": [], "description": "This executable has a PDB path", "severity": 1, "marks": [ { "category": "pdb_path", "ioc": "D:\\[Project]\\[local_check]\\Output\\Release\\BZDownload.pdb", "type": "ioc", "description": null } ], "references": [], "name": "has_pdb" }, { "markcount": 1, "families": [], "description": "Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available", "severity": 1, "marks": [ { "call": { "category": "system", "status": 1, "stacktrace": [], "api": "GlobalMemoryStatusEx", "return_value": 1, "arguments": {}, "time": 1583992386.812625, "tid": 2308, "flags": {} }, "pid": 2660, "type": "call", "cid": 178 } ], "references": [], "name": "antivm_memory_available" }, { "markcount": 3, "families": [], "description": "The executable contains unknown PE section names indicative of a packer (could be a false positive)", "severity": 1, "marks": [ { "category": "section", "ioc": ".dtd", "type": "ioc", "description": null }, { "category": "section", "ioc": ".dtc", "type": "ioc", "description": null }, { "category": "section", "ioc": ".phx", "type": "ioc", "description": null } ], "references": [], "name": "pe_features" }, { "markcount": 1, "families": [], "description": "The file contains an unknown PE resource name possibly indicative of a packer", "severity": 1, "marks": [ { "category": "resource name", "ioc": "PNG", "type": "ioc", "description": null } ], "references": [], "name": "pe_unknown_resource_name" }, { "markcount": 1, "families": [], "description": "One or more processes crashed", "severity": 1, "marks": [ { "call": { "category": "__notification__", "status": 1, "stacktrace": [], "raw": [ "stacktrace" ], "api": "__exception__", "return_value": 0, "arguments": { "stacktrace": "f\n5\na\n6\n4\n4\na\n7\na\ne\nf\nd\n8\n6\n3\nf\n0\na\n2\nd\n1\n1\n4\nd\na\n6\na\n6\n3\n1\n7\n2\n6\n6\n3\n1\ne\n9\n6\ne\na\n0\n7\n5\n2\na\n8\nc\n5\n5\n0\n5\na\nc\na\n2\n1\n3\n5\n6\n4\n6\nb\ne\n+\n0\nx\n1\n7\n0\ne\n4\n \n@\n \n0\nx\n2\n1\n7\n0\ne\n4\n\n\nf\n5\na\n6\n4\n4\na\n7\na\ne\nf\nd\n8\n6\n3\nf\n0\na\n2\nd\n1\n1\n4\nd\na\n6\na\n6\n3\n1\n7\n2\n6\n6\n3\n1\ne\n9\n6\ne\na\n0\n7\n5\n2\na\n8\nc\n5\n5\n0\n5\na\nc\na\n2\n1\n3\n5\n6\n4\n6\nb\ne\n+\n0\nx\n6\n3\nb\n2\n \n@\n \n0\nx\n2\n0\n6\n3\nb\n2\n\n\nf\n5\na\n6\n4\n4\na\n7\na\ne\nf\nd\n8\n6\n3\nf\n0\na\n2\nd\n1\n1\n4\nd\na\n6\na\n6\n3\n1\n7\n2\n6\n6\n3\n1\ne\n9\n6\ne\na\n0\n7\n5\n2\na\n8\nc\n5\n5\n0\n5\na\nc\na\n2\n1\n3\n5\n6\n4\n6\nb\ne\n+\n0\nx\n1\n8\nf\n6\n \n@\n \n0\nx\n2\n0\n1\n8\nf\n6\n\n\nf\n5\na\n6\n4\n4\na\n7\na\ne\nf\nd\n8\n6\n3\nf\n0\na\n2\nd\n1\n1\n4\nd\na\n6\na\n6\n3\n1\n7\n2\n6\n6\n3\n1\ne\n9\n6\ne\na\n0\n7\n5\n2\na\n8\nc\n5\n5\n0\n5\na\nc\na\n2\n1\n3\n5\n6\n4\n6\nb\ne\n+\n0\nx\nb\nd\nc\nc\n6\n \n@\n \n0\nx\n2\nb\nd\nc\nc\n6\n\n\nB\na\ns\ne\nT\nh\nr\ne\na\nd\nI\nn\ni\nt\nT\nh\nu\nn\nk\n+\n0\nx\n1\n2\n \nV\ne\nr\ni\nf\ny\nC\no\nn\ns\no\nl\ne\nI\no\nH\na\nn\nd\nl\ne\n-\n0\nx\nb\n3\n \nk\ne\nr\nn\ne\nl\n3\n2\n+\n0\nx\n1\n3\n3\nc\na\n \n@\n \n0\nx\n7\n5\nb\nc\n3\n3\nc\na\n\n\nR\nt\nl\nI\nn\ni\nt\ni\na\nl\ni\nz\ne\nE\nx\nc\ne\np\nt\ni\no\nn\nC\nh\na\ni\nn\n+\n0\nx\n6\n3\n \nR\nt\nl\nA\nl\nl\no\nc\na\nt\ne\nA\nc\nt\ni\nv\na\nt\ni\no\nn\nC\no\nn\nt\ne\nx\nt\nS\nt\na\nc\nk\n-\n0\nx\na\n1\n \nn\nt\nd\nl\nl\n+\n0\nx\n3\n9\ne\nd\n2\n \n@\n \n0\nx\n7\n7\nb\nc\n9\ne\nd\n2\n\n\nR\nt\nl\nI\nn\ni\nt\ni\na\nl\ni\nz\ne\nE\nx\nc\ne\np\nt\ni\no\nn\nC\nh\na\ni\nn\n+\n0\nx\n3\n6\n \nR\nt\nl\nA\nl\nl\no\nc\na\nt\ne\nA\nc\nt\ni\nv\na\nt\ni\no\nn\nC\no\nn\nt\ne\nx\nt\nS\nt\na\nc\nk\n-\n0\nx\nc\ne\n \nn\nt\nd\nl\nl\n+\n0\nx\n3\n9\ne\na\n5\n \n@\n \n0\nx\n7\n7\nb\nc\n9\ne\na\n5", "registers": { "esp": 4911668, "edi": 8481440, "eax": 1447909480, "ebp": 4911724, "edx": 22104, "ebx": 0, "esi": 8600488, "ecx": 10 }, "exception": { "instruction_r": "ed 81 fb 68 58 4d 56 0f 94 45 e4 5b 59 5a c7 45", "symbol": "f5a644a7aefd863f0a2d114da6a631726631e96ea0752a8c5505aca2135646be+0x21898", "instruction": "in eax, dx", "module": "f5a644a7aefd863f0a2d114da6a631726631e96ea0752a8c5505aca2135646be.bin", "exception_code": "0xc0000096", "offset": 137368, "address": "0x221898" } }, "time": 1583992386.828625, "tid": 2308, "flags": {} }, "pid": 2660, "type": "call", "cid": 204 } ], "references": [], "name": "raises_exception" }, { "markcount": 2, "families": [], "description": "Allocates read-write-execute memory (usually to unpack itself)", "severity": 2, "marks": [ { "call": { "category": "process", "status": 1, "stacktrace": [], "api": "NtAllocateVirtualMemory", "return_value": 0, "arguments": { "process_identifier": 2660, "region_size": 65536, "stack_dep_bypass": 0, "stack_pivoted": 0, "heap_dep_bypass": 1, "protection": 64, "process_handle": "0xffffffff", "allocation_type": 12288, "base_address": "0x6dbb0000" }, "time": 1583992386.875625, "tid": 2308, "flags": { "protection": "PAGE_EXECUTE_READWRITE", "allocation_type": "MEM_COMMIT|MEM_RESERVE" } }, "pid": 2660, "type": "call", "cid": 522 }, { "call": { "category": "process", "status": 1, "stacktrace": [], "api": "NtProtectVirtualMemory", "return_value": 0, "arguments": { "process_identifier": 2660, "stack_dep_bypass": 0, "stack_pivoted": 0, "heap_dep_bypass": 0, "length": 4096, "protection": 64, "process_handle": "0xffffffff", "base_address": "0x75bc7000" }, "time": 1583992386.875625, "tid": 2308, "flags": { "protection": "PAGE_EXECUTE_READWRITE" } }, "pid": 2660, "type": "call", "cid": 523 } ], "references": [], "name": "allocates_rwx" }, { "markcount": 11, "families": [], "description": "Foreign language identified in PE resource", "severity": 2, "marks": [ { "name": "PNG", "language": "LANG_CHINESE", "offset": "0x00124d68", "filetype": "PNG image data, 260 x 180, 8-bit\/color RGBA, non-interlaced", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x0000bc26" }, { "name": "RT_ICON", "language": "LANG_CHINESE", "offset": "0x00124608", "filetype": "GLS_BINARY_LSB_FIRST", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000468" }, { "name": "RT_ICON", "language": "LANG_CHINESE", "offset": "0x00124608", "filetype": "GLS_BINARY_LSB_FIRST", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000468" }, { "name": "RT_ICON", "language": "LANG_CHINESE", "offset": "0x00124608", "filetype": "GLS_BINARY_LSB_FIRST", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000468" }, { "name": "RT_ICON", "language": "LANG_CHINESE", "offset": "0x00124608", "filetype": "GLS_BINARY_LSB_FIRST", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000468" }, { "name": "RT_ICON", "language": "LANG_CHINESE", "offset": "0x00124608", "filetype": "GLS_BINARY_LSB_FIRST", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000468" }, { "name": "RT_ICON", "language": "LANG_CHINESE", "offset": "0x00124608", "filetype": "GLS_BINARY_LSB_FIRST", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000468" }, { "name": "RT_MENU", "language": "LANG_CHINESE", "offset": "0x00124ad0", "filetype": "data", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000026" }, { "name": "RT_STRING", "language": "LANG_CHINESE", "offset": "0x00130990", "filetype": "data", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x00000048" }, { "name": "RT_GROUP_ICON", "language": "LANG_CHINESE", "offset": "0x00124a70", "filetype": "MS Windows icon resource - 6 icons, 48x48", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x0000005a" }, { "name": "RT_VERSION", "language": "LANG_CHINESE", "offset": "0x00124af8", "filetype": "data", "sublanguage": "SUBLANG_CHINESE_SIMPLIFIED", "type": "generic", "size": "0x0000026c" } ], "references": [], "name": "origin_langid" }, { "markcount": 1, "families": [], "description": "The binary likely contains encrypted or compressed data indicative of a packer", "severity": 2, "marks": [ { "entropy": 7.178841276794433, "section": { "size_of_data": "0x00011c00", "virtual_address": "0x0011f000", "entropy": 7.178841276794433, "name": ".rsrc", "virtual_size": "0x00011b60" }, "type": "generic", "description": "A section with a high entropy has been found" } ], "references": [ "http:\/\/www.forensickb.com\/2013\/03\/file-entropy-explained.html", "http:\/\/virii.es\/U\/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf" ], "name": "packer_entropy" }, { "markcount": 6, "families": [], "description": "Repeatedly searches for a not-found process, you may want to run a web browser during analysis", "severity": 2, "marks": [ { "call": { "category": "process", "status": 0, "stacktrace": [], "last_error": 18, "nt_status": 0, "api": "Process32NextW", "return_value": 0, "arguments": { "process_name": "SearchFilterHost.exe", "snapshot_handle": "0x000001ac", "process_identifier": 2420 }, "time": 1583992386.859625, "tid": 2308, "flags": {} }, "pid": 2660, "type": "call", "cid": 266 }, { "call": { "category": "process", "status": 0, "stacktrace": [], "last_error": 18, "nt_status": 0, "api": "Process32NextW", "return_value": 0, "arguments": { "process_name": "SearchFilterHost.exe", "snapshot_handle": "0x000001ac", "process_identifier": 2420 }, "time": 1583992386.859625, "tid": 2308, "flags": {} }, "pid": 2660, "type": "call", "cid": 307 }, { "call": { "category": "process", "status": 0, "stacktrace": [], "last_error": 18, "nt_status": 0, "api": "Process32NextW", "return_value": 0, "arguments": { "process_name": "SearchFilterHost.exe", "snapshot_handle": "0x000001ac", "process_identifier": 2420 }, "time": 1583992386.859625, "tid": 2308, "flags": {} }, "pid": 2660, "type": "call", "cid": 348 }, { "call": { "category": "process", "status": 0, "stacktrace": [], "last_error": 18, "nt_status": 0, "api": "Process32NextW", "return_value": 0, "arguments": { "process_name": "SearchFilterHost.exe", "snapshot_handle": "0x000001ac", "process_identifier": 2420 }, "time": 1583992386.859625, "tid": 2308, "flags": {} }, "pid": 2660, "type": "call", "cid": 389 }, { "call": { "category": "process", "status": 0, "stacktrace": [], "last_error": 18, "nt_status": 0, "api": "Process32NextW", "return_value": 0, "arguments": { "process_name": "SearchFilterHost.exe", "snapshot_handle": "0x000001ac", "process_identifier": 2420 }, "time": 1583992386.875625, "tid": 2308, "flags": {} }, "pid": 2660, "type": "call", "cid": 430 }, { "call": { "category": "process", "status": 0, "stacktrace": [], "last_error": 18, "nt_status": 0, "api": "Process32NextW", "return_value": 0, "arguments": { "process_name": "SearchFilterHost.exe", "snapshot_handle": "0x000001ac", "process_identifier": 2420 }, "time": 1583992386.875625, "tid": 2308, "flags": {} }, "pid": 2660, "type": "call", "cid": 471 } ], "references": [], "name": "process_needed" }, { "markcount": 1, "families": [], "description": "Detects VMWare through the in instruction feature", "severity": 3, "marks": [ { "call": { "category": "__notification__", "status": 1, "stacktrace": [], "raw": [ "stacktrace" ], "api": "__exception__", "return_value": 0, "arguments": { "stacktrace": "f\n5\na\n6\n4\n4\na\n7\na\ne\nf\nd\n8\n6\n3\nf\n0\na\n2\nd\n1\n1\n4\nd\na\n6\na\n6\n3\n1\n7\n2\n6\n6\n3\n1\ne\n9\n6\ne\na\n0\n7\n5\n2\na\n8\nc\n5\n5\n0\n5\na\nc\na\n2\n1\n3\n5\n6\n4\n6\nb\ne\n+\n0\nx\n1\n7\n0\ne\n4\n \n@\n \n0\nx\n2\n1\n7\n0\ne\n4\n\n\nf\n5\na\n6\n4\n4\na\n7\na\ne\nf\nd\n8\n6\n3\nf\n0\na\n2\nd\n1\n1\n4\nd\na\n6\na\n6\n3\n1\n7\n2\n6\n6\n3\n1\ne\n9\n6\ne\na\n0\n7\n5\n2\na\n8\nc\n5\n5\n0\n5\na\nc\na\n2\n1\n3\n5\n6\n4\n6\nb\ne\n+\n0\nx\n6\n3\nb\n2\n \n@\n \n0\nx\n2\n0\n6\n3\nb\n2\n\n\nf\n5\na\n6\n4\n4\na\n7\na\ne\nf\nd\n8\n6\n3\nf\n0\na\n2\nd\n1\n1\n4\nd\na\n6\na\n6\n3\n1\n7\n2\n6\n6\n3\n1\ne\n9\n6\ne\na\n0\n7\n5\n2\na\n8\nc\n5\n5\n0\n5\na\nc\na\n2\n1\n3\n5\n6\n4\n6\nb\ne\n+\n0\nx\n1\n8\nf\n6\n \n@\n \n0\nx\n2\n0\n1\n8\nf\n6\n\n\nf\n5\na\n6\n4\n4\na\n7\na\ne\nf\nd\n8\n6\n3\nf\n0\na\n2\nd\n1\n1\n4\nd\na\n6\na\n6\n3\n1\n7\n2\n6\n6\n3\n1\ne\n9\n6\ne\na\n0\n7\n5\n2\na\n8\nc\n5\n5\n0\n5\na\nc\na\n2\n1\n3\n5\n6\n4\n6\nb\ne\n+\n0\nx\nb\nd\nc\nc\n6\n \n@\n \n0\nx\n2\nb\nd\nc\nc\n6\n\n\nB\na\ns\ne\nT\nh\nr\ne\na\nd\nI\nn\ni\nt\nT\nh\nu\nn\nk\n+\n0\nx\n1\n2\n \nV\ne\nr\ni\nf\ny\nC\no\nn\ns\no\nl\ne\nI\no\nH\na\nn\nd\nl\ne\n-\n0\nx\nb\n3\n \nk\ne\nr\nn\ne\nl\n3\n2\n+\n0\nx\n1\n3\n3\nc\na\n \n@\n \n0\nx\n7\n5\nb\nc\n3\n3\nc\na\n\n\nR\nt\nl\nI\nn\ni\nt\ni\na\nl\ni\nz\ne\nE\nx\nc\ne\np\nt\ni\no\nn\nC\nh\na\ni\nn\n+\n0\nx\n6\n3\n \nR\nt\nl\nA\nl\nl\no\nc\na\nt\ne\nA\nc\nt\ni\nv\na\nt\ni\no\nn\nC\no\nn\nt\ne\nx\nt\nS\nt\na\nc\nk\n-\n0\nx\na\n1\n \nn\nt\nd\nl\nl\n+\n0\nx\n3\n9\ne\nd\n2\n \n@\n \n0\nx\n7\n7\nb\nc\n9\ne\nd\n2\n\n\nR\nt\nl\nI\nn\ni\nt\ni\na\nl\ni\nz\ne\nE\nx\nc\ne\np\nt\ni\no\nn\nC\nh\na\ni\nn\n+\n0\nx\n3\n6\n \nR\nt\nl\nA\nl\nl\no\nc\na\nt\ne\nA\nc\nt\ni\nv\na\nt\ni\no\nn\nC\no\nn\nt\ne\nx\nt\nS\nt\na\nc\nk\n-\n0\nx\nc\ne\n \nn\nt\nd\nl\nl\n+\n0\nx\n3\n9\ne\na\n5\n \n@\n \n0\nx\n7\n7\nb\nc\n9\ne\na\n5", "registers": { "esp": 4911668, "edi": 8481440, "eax": 1447909480, "ebp": 4911724, "edx": 22104, "ebx": 0, "esi": 8600488, "ecx": 10 }, "exception": { "instruction_r": "ed 81 fb 68 58 4d 56 0f 94 45 e4 5b 59 5a c7 45", "symbol": "f5a644a7aefd863f0a2d114da6a631726631e96ea0752a8c5505aca2135646be+0x21898", "instruction": "in eax, dx", "module": "f5a644a7aefd863f0a2d114da6a631726631e96ea0752a8c5505aca2135646be.bin", "exception_code": "0xc0000096", "offset": 137368, "address": "0x221898" } }, "time": 1583992386.828625, "tid": 2308, "flags": {} }, "pid": 2660, "type": "call", "cid": 204 } ], "references": [], "name": "antivm_vmware_in_instruction" } ]
The Yara rules did not detect anything in the file.
{ "tls": [], "udp": [ { "src": "192.168.56.101", "dst": "192.168.56.255", "offset": 546, "time": 3.037649154663086, "dport": 137, "sport": 137 }, { "src": "192.168.56.101", "dst": "192.168.56.255", "offset": 7818, "time": 9.078919172286987, "dport": 138, "sport": 138 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 9662, "time": 3.020536184310913, "dport": 5355, "sport": 51001 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 9990, "time": 1.0323231220245361, "dport": 5355, "sport": 53595 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 10318, "time": 3.0318241119384766, "dport": 5355, "sport": 53848 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 10646, "time": 1.616197109222412, "dport": 5355, "sport": 54255 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 10974, "time": -0.08986496925354004, "dport": 5355, "sport": 55314 }, { "src": "192.168.56.101", "dst": "239.255.255.250", "offset": 11302, "time": 1.5948991775512695, "dport": 1900, "sport": 1900 }, { "src": "192.168.56.101", "dst": "239.255.255.250", "offset": 30712, "time": 1.0659890174865723, "dport": 3702, "sport": 49152 }, { "src": "192.168.56.101", "dst": "239.255.255.250", "offset": 39096, "time": 3.1250250339508057, "dport": 1900, "sport": 53598 } ], "dns_servers": [], "http": [], "icmp": [], "smtp": [], "tcp": [], "smtp_ex": [], "mitm": [], "hosts": [], "pcap_sha256": "a524ac5e9420be0f4ce4ac5318f9500d27959db4bee9ef6f36dba7570281aecb", "dns": [], "http_ex": [], "domains": [], "dead_hosts": [], "sorted_pcap_sha256": "1f6b1bc92a6e6a99f8052853026cb53ea3a9622948102c340b811acb42fc1cd9", "irc": [], "https_ex": [] }
The instructions below shows how to remove tplink@154_82259.exe with help from the FreeFixer removal tool. Basically, you install FreeFixer, scan your computer, check the tplink@154_82259.exe file for removal, restart your computer and scan it again to verify that tplink@154_82259.exe has been successfully removed. Here are the removal instructions in more detail:
tplink@154_82259.exe may also use other filenames. The most common variants are listed below:
Property | Value |
---|---|
MD5 | cf517d077e9c152120787eb6b251615b |
SHA256 | f5a644a7aefd863f0a2d114da6a631726631e96ea0752a8c5505aca2135646be |
These are some of the error messages that can appear related to tplink@154_82259.exe:
tplink@154_82259.exe has encountered a problem and needs to close. We are sorry for the inconvenience.
tplink@154_82259.exe - Application Error. The instruction at "0xXXXXXXXX" referenced memory at "0xXXXXXXXX". The memory could not be "read/written". Click on OK to terminate the program.
????? has stopped working.
End Program - tplink@154_82259.exe. This program is not responding.
tplink@154_82259.exe is not a valid Win32 application.
tplink@154_82259.exe - Application Error. The application failed to initialize properly (0xXXXXXXXX). Click OK to terminate the application.
To help other users, please let us know what you will do with the file:
Please share with the other users what you think about this file. What does this file do? Is it legitimate or something that your computer is better without? Do you know how it was installed on your system? Did you install it yourself or did it come bundled with some other software? Is it running smoothly or do you get some error message? Any information that will help to document this file is welcome. Thank you for your contributions.
I'm reading all new comments so don't hesitate to post a question about the file. If I don't have the answer perhaps another user can help you.
No comments posted yet.