What is DDTray.exe?

DDTray.exe is part of Device Doctor Tray and developed by Device Doctor Software Inc. according to the DDTray.exe version information.

DDTray.exe's description is "Device Doctor Tray"

DDTray.exe is digitally signed by AVANQUEST S.A..

DDTray.exe is usually located in the 'C:\Program Files (x86)\Device Doctor\' folder.

Some of the anti-virus scanners at VirusTotal detected DDTray.exe.

If you have additional information about the file, please share it with the FreeFixer users by posting a comment at the bottom of this page.

Vendor and version information [?]

The following is the available information on DDTray.exe:

PropertyValue
Product nameDevice Doctor Tray
Company nameDevice Doctor Software Inc.
File descriptionDevice Doctor Tray
Internal nameDevice Doctor Tray
Original filenameDDTray.exe
Legal copyrightCopyright 2018 Device Doctor Software Inc.
Legal trademarkCopyright 2018 Device Doctor Software Inc.
Product version5.0.162
File version3.1.0.5

Here's a screenshot of the file properties when displayed by Windows Explorer:

Product nameDevice Doctor Tray
Company nameDevice Doctor Software Inc.
File descriptionDevice Doctor Tray
Internal nameDevice Doctor Tray
Original filenameDDTray.exe
Legal copyrightCopyright 2018 Device Doctor Softwar..
Legal trademarkCopyright 2018 Device Doctor Softwar..
Product version5.0.162
File version3.1.0.5

Digital signatures [?]

DDTray.exe has a valid digital signature.

PropertyValue
Signer nameAVANQUEST S.A.
Certificate issuer nameSymantec Class 3 Extended Validation Code Signing CA - G2
Certificate serial number6534c80575906269e9259e115b137fcf

VirusTotal report

3 of the 66 anti-virus programs at VirusTotal detected the DDTray.exe file. That's a 5% detection rate.

ScannerDetection Name
DrWeb Program.Unwanted.1895
ESET-NOD32 a variant of Win32/Avanquest.B potentially unwanted
Rising Malware.Heuristic.MLite(86%) (AI-LITE:5bSqGBjAgQtMewoloMr3tw)
3 of the 66 anti-virus programs detected the DDTray.exe file.

Sandbox Report

The following information was gathered by executing the file inside Cuckoo Sandbox.

Summary

Successfully executed process in sandbox.

Summary

{
    "directory_created": [
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\",
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.madExcept"
    ],
    "dll_loaded": [
        "ntmarta.dll",
        "Msctf.dll",
        "API-MS-Win-Security-LSALookup-L1-1-0.dll",
        "FaultRep.dll",
        "WINSTA.dll",
        "CFGMGR32.dll",
        "ADVAPI32.dll",
        "kernel32.dll",
        "uxtheme.dll",
        "wtsapi32.dll",
        "dwmapi.dll",
        "RPCRT4.dll",
        "USER32.dll",
        "imm32.dll"
    ],
    "file_opened": [
        "",
        "\\Device\\NamedPipe\\",
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.bin",
        "C:\\Windows\\Globalization\\Sorting\\sortdefault.nls"
    ],
    "regkey_opened": [
        "HKEY_LOCAL_MACHINE\\Software\\Embarcadero\\Locales",
        "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\LSA\\AccessProviders",
        "HKEY_LOCAL_MACHINE\\Software\\CodeGear\\Locales",
        "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\LDAP",
        "HKEY_CURRENT_USER\\Software\\Embarcadero\\Locales",
        "HKEY_CURRENT_USER\\SOFTWARE\\Device Doctor",
        "HKEY_CURRENT_USER\\Software\\CodeGear\\Locales",
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontSubstitutes",
        "HKEY_CURRENT_USER\\Software\\Borland\\Locales",
        "HKEY_CURRENT_USER\\SOFTWARE\\Licenses\\8fbb0092a04e2d5d1a97b5da9c8a56f0",
        "HKEY_CURRENT_USER\\Software\\Borland\\Delphi\\Locales"
    ],
    "file_deleted": [
        "C:\\Users\\cuck\\AppData\\Local\\Temp",
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.madExcept"
    ],
    "directory_removed": [
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.madExcept\\"
    ],
    "file_exists": [
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\English.ini",
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.madExcept\\"
    ],
    "mutex": [
        "madExceptSettingsMtx$680",
        "DDTray"
    ],
    "regkey_read": [
        "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontSubstitutes\\MS Shell Dlg 2",
        "HKEY_CURRENT_USER\\Software\\Device Doctor\\OutdatedDrivers",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\en-US",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Locale\\00000409",
        "HKEY_CURRENT_USER\\Software\\Device Doctor\\DelayedStart",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\LDAP\\UseOldHostResolutionOrder",
        "HKEY_CURRENT_USER\\Software\\Device Doctor\\s_SmartMode",
        "HKEY_CURRENT_USER\\Software\\Device Doctor\\StartWithWindows",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Language Groups\\1",
        "HKEY_CURRENT_USER\\Software\\Device Doctor\\InstallationDate",
        "HKEY_CURRENT_USER\\Software\\Device Doctor\\s_SmartDate",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\en-US",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\AccessProviders\\MartaExtension",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\LDAP\\UseHostnameAsAlias",
        "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\LDAP\\LdapClientIntegrity"
    ],
    "directory_enumerated": [
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.en",
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.EN",
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.en-US",
        "C:\\Users\\cuck\\AppData\\Roaming\\Device Doctor\\*.status",
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.madExcept\\*.*",
        "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.ENU"
    ],
    "regkey_written": [
        "HKEY_CURRENT_USER\\Software\\Device Doctor\\s_Enable",
        "HKEY_CURRENT_USER\\Software\\Device Doctor\\s_Exec",
        "HKEY_CURRENT_USER\\Software\\Device Doctor\\s_SmartMode",
        "HKEY_CURRENT_USER\\Software\\Device Doctor\\s_SmartScan",
        "HKEY_CURRENT_USER\\Software\\Device Doctor\\s_SmartDate",
        "HKEY_CURRENT_USER\\Software\\Device Doctor\\TrayNotification",
        "HKEY_CURRENT_USER\\Software\\Device Doctor\\StartWithWindows",
        "HKEY_CURRENT_USER\\Software\\Device Doctor\\s_Mode"
    ]
}

Generic

[
    {
        "process_path": "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.bin",
        "process_name": "1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.bin",
        "pid": 1664,
        "summary": {
            "directory_created": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\",
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.madExcept"
            ],
            "dll_loaded": [
                "ntmarta.dll",
                "Msctf.dll",
                "API-MS-Win-Security-LSALookup-L1-1-0.dll",
                "FaultRep.dll",
                "WINSTA.dll",
                "CFGMGR32.dll",
                "ADVAPI32.dll",
                "kernel32.dll",
                "uxtheme.dll",
                "wtsapi32.dll",
                "dwmapi.dll",
                "RPCRT4.dll",
                "USER32.dll",
                "imm32.dll"
            ],
            "file_opened": [
                "",
                "\\Device\\NamedPipe\\",
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.bin",
                "C:\\Windows\\Globalization\\Sorting\\sortdefault.nls"
            ],
            "regkey_opened": [
                "HKEY_LOCAL_MACHINE\\Software\\Embarcadero\\Locales",
                "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\LSA\\AccessProviders",
                "HKEY_LOCAL_MACHINE\\Software\\CodeGear\\Locales",
                "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\LDAP",
                "HKEY_CURRENT_USER\\Software\\Embarcadero\\Locales",
                "HKEY_CURRENT_USER\\SOFTWARE\\Device Doctor",
                "HKEY_CURRENT_USER\\Software\\CodeGear\\Locales",
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontSubstitutes",
                "HKEY_CURRENT_USER\\Software\\Borland\\Locales",
                "HKEY_CURRENT_USER\\SOFTWARE\\Licenses\\8fbb0092a04e2d5d1a97b5da9c8a56f0",
                "HKEY_CURRENT_USER\\Software\\Borland\\Delphi\\Locales"
            ],
            "file_deleted": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp",
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.madExcept"
            ],
            "directory_removed": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.madExcept\\"
            ],
            "file_exists": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\English.ini",
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.madExcept\\"
            ],
            "mutex": [
                "madExceptSettingsMtx$680",
                "DDTray"
            ],
            "regkey_read": [
                "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontSubstitutes\\MS Shell Dlg 2",
                "HKEY_CURRENT_USER\\Software\\Device Doctor\\OutdatedDrivers",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\CustomLocale\\en-US",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Locale\\00000409",
                "HKEY_CURRENT_USER\\Software\\Device Doctor\\DelayedStart",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\LDAP\\UseOldHostResolutionOrder",
                "HKEY_CURRENT_USER\\Software\\Device Doctor\\s_SmartMode",
                "HKEY_CURRENT_USER\\Software\\Device Doctor\\StartWithWindows",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Language Groups\\1",
                "HKEY_CURRENT_USER\\Software\\Device Doctor\\InstallationDate",
                "HKEY_CURRENT_USER\\Software\\Device Doctor\\s_SmartDate",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\ExtendedLocale\\en-US",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Lsa\\AccessProviders\\MartaExtension",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\LDAP\\UseHostnameAsAlias",
                "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\LDAP\\LdapClientIntegrity"
            ],
            "directory_enumerated": [
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.en",
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.EN",
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.en-US",
                "C:\\Users\\cuck\\AppData\\Roaming\\Device Doctor\\*.status",
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.madExcept\\*.*",
                "C:\\Users\\cuck\\AppData\\Local\\Temp\\1e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5.ENU"
            ],
            "regkey_written": [
                "HKEY_CURRENT_USER\\Software\\Device Doctor\\s_Enable",
                "HKEY_CURRENT_USER\\Software\\Device Doctor\\s_Exec",
                "HKEY_CURRENT_USER\\Software\\Device Doctor\\s_SmartMode",
                "HKEY_CURRENT_USER\\Software\\Device Doctor\\s_SmartScan",
                "HKEY_CURRENT_USER\\Software\\Device Doctor\\s_SmartDate",
                "HKEY_CURRENT_USER\\Software\\Device Doctor\\TrayNotification",
                "HKEY_CURRENT_USER\\Software\\Device Doctor\\StartWithWindows",
                "HKEY_CURRENT_USER\\Software\\Device Doctor\\s_Mode"
            ]
        },
        "first_seen": 1586447587.546875,
        "ppid": 2448
    },
    {
        "process_path": "C:\\Windows\\System32\\lsass.exe",
        "process_name": "lsass.exe",
        "pid": 476,
        "summary": {},
        "first_seen": 1586447587.328125,
        "ppid": 376
    }
]

Signatures

[
    {
        "markcount": 1,
        "families": [],
        "description": "At least one process apparently crashed during execution",
        "severity": 1,
        "marks": [
            {
                "call": {
                    "category": "system",
                    "status": 1,
                    "stacktrace": [],
                    "api": "LdrLoadDll",
                    "return_value": 0,
                    "arguments": {
                        "basename": "FaultRep",
                        "module_address": "0x75160000",
                        "flags": 0,
                        "module_name": "FaultRep.dll",
                        "stack_pivoted": 0
                    },
                    "time": 1586447587.671875,
                    "tid": 2736,
                    "flags": {}
                },
                "pid": 1664,
                "type": "call",
                "cid": 119
            }
        ],
        "references": [],
        "name": "exec_crash"
    },
    {
        "markcount": 2,
        "families": [],
        "description": "The executable contains unknown PE section names indicative of a packer (could be a false positive)",
        "severity": 1,
        "marks": [
            {
                "category": "section",
                "ioc": ".itext",
                "type": "ioc",
                "description": null
            },
            {
                "category": "section",
                "ioc": ".didata",
                "type": "ioc",
                "description": null
            }
        ],
        "references": [],
        "name": "pe_features"
    },
    {
        "markcount": 1,
        "families": [],
        "description": "The executable uses a known packer",
        "severity": 1,
        "marks": [
            {
                "category": "packer",
                "ioc": "BobSoft Mini Delphi -> BoB \/ BobSoft",
                "type": "ioc",
                "description": null
            }
        ],
        "references": [],
        "name": "peid_packer"
    },
    {
        "markcount": 1,
        "families": [],
        "description": "The file contains an unknown PE resource name possibly indicative of a packer",
        "severity": 1,
        "marks": [
            {
                "category": "resource name",
                "ioc": "MAD",
                "type": "ioc",
                "description": null
            }
        ],
        "references": [],
        "name": "pe_unknown_resource_name"
    },
    {
        "markcount": 40,
        "families": [],
        "description": "Allocates read-write-execute memory (usually to unpack itself)",
        "severity": 2,
        "marks": [
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x00400000"
                    },
                    "time": 1586447587.687875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 169
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x00407000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 199
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x005e4000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 201
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x005e4000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 203
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x0044e000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 205
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x00509000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 207
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x00407000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 209
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x00407000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 211
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x00407000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 213
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x00407000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 215
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x00407000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 217
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x00407000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 219
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x00407000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 221
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x00407000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 223
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x00407000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 225
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x00406000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 227
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x0044e000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 229
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x0044e000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 231
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x0044e000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 233
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x00621000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 266
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x00622000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 268
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x74c61000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 270
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x750c0000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 272
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x75131000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 274
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x75161000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 276
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x75a01000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 278
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x75cc1000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 280
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x76031000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 282
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x763a0000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 284
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x764a1000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 286
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x76531000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 288
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x76610000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 290
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x766c1000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 292
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x77311000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 294
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x77351000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 296
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x77571000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 298
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x775d1000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 300
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x766c2000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 303
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtProtectVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "length": 4096,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "base_address": "0x77571000"
                    },
                    "time": 1586447587.703875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 305
            },
            {
                "call": {
                    "category": "process",
                    "status": 1,
                    "stacktrace": [],
                    "api": "NtAllocateVirtualMemory",
                    "return_value": 0,
                    "arguments": {
                        "process_identifier": 1664,
                        "region_size": 4096,
                        "stack_dep_bypass": 0,
                        "stack_pivoted": 0,
                        "heap_dep_bypass": 0,
                        "protection": 64,
                        "process_handle": "0xffffffff",
                        "allocation_type": 4096,
                        "base_address": "0x02170000"
                    },
                    "time": 1586447587.718875,
                    "tid": 2736,
                    "flags": {
                        "protection": "PAGE_EXECUTE_READWRITE",
                        "allocation_type": "MEM_COMMIT"
                    }
                },
                "pid": 1664,
                "type": "call",
                "cid": 380
            }
        ],
        "references": [],
        "name": "allocates_rwx"
    }
]

Yara

The Yara rules did not detect anything in the file.

Network

{
    "tls": [],
    "udp": [
        {
            "src": "192.168.56.101",
            "dst": "192.168.56.255",
            "offset": 662,
            "time": 6.161355972290039,
            "dport": 137,
            "sport": 137
        },
        {
            "src": "192.168.56.101",
            "dst": "192.168.56.255",
            "offset": 5342,
            "time": 12.16231894493103,
            "dport": 138,
            "sport": 138
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 7186,
            "time": 6.097159147262573,
            "dport": 5355,
            "sport": 51001
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 7514,
            "time": 4.128793001174927,
            "dport": 5355,
            "sport": 53595
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 7842,
            "time": 6.105509042739868,
            "dport": 5355,
            "sport": 53848
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 8170,
            "time": 4.741358041763306,
            "dport": 5355,
            "sport": 54255
        },
        {
            "src": "192.168.56.101",
            "dst": "224.0.0.252",
            "offset": 8498,
            "time": 2.998142957687378,
            "dport": 5355,
            "sport": 55314
        },
        {
            "src": "192.168.56.101",
            "dst": "239.255.255.250",
            "offset": 8826,
            "time": 4.6634581089019775,
            "dport": 1900,
            "sport": 1900
        },
        {
            "src": "192.168.56.101",
            "dst": "239.255.255.250",
            "offset": 28236,
            "time": 4.149961948394775,
            "dport": 3702,
            "sport": 49152
        },
        {
            "src": "192.168.56.101",
            "dst": "239.255.255.250",
            "offset": 36620,
            "time": 6.224070072174072,
            "dport": 1900,
            "sport": 53598
        }
    ],
    "dns_servers": [],
    "http": [],
    "icmp": [],
    "smtp": [],
    "tcp": [],
    "smtp_ex": [],
    "mitm": [],
    "hosts": [],
    "pcap_sha256": "b03f5a52f4cdc102233728a646a903f54ab7d47fff968a1225c4e88a51dd2d79",
    "dns": [],
    "http_ex": [],
    "domains": [],
    "dead_hosts": [],
    "sorted_pcap_sha256": "d84f957f46adf87fa9d5d6903d4ef24131b0be85e08b9f97ba87deb899f09da8",
    "irc": [],
    "https_ex": []
}

Screenshots

Screenshot from the sandboxScreenshot from the sandboxScreenshot from the sandbox

DDTray.exe removal instructions

The instructions below shows how to remove DDTray.exe with help from the FreeFixer removal tool. Basically, you install FreeFixer, scan your computer, check the DDTray.exe file for removal, restart your computer and scan it again to verify that DDTray.exe has been successfully removed. Here are the removal instructions in more detail:

  1. Download and install FreeFixer: http://www.freefixer.com/download.html
  2. Start FreeFixer and press the Start Scan button. The scan will finish in approximately five minutes.
    Screenshot of Start Scan button
  3. When the scan is finished, locate DDTray.exe in the scan result and tick the checkbox next to the DDTray.exe file. Do not check any other file for removal unless you are 100% sure you want to delete it. Tip: Press CTRL-F to open up FreeFixer's search dialog to quickly locate DDTray.exe in the scan result.
    Red arrow point on the unwanted file
    C:\Program Files (x86)\Device Doctor\DDTray.exe
  4. Scroll down to the bottom of the scan result and press the Fix button. FreeFixer will now delete the DDTray.exe file.
    Screenshot of Fix button
  5. Restart your computer.
  6. Start FreeFixer and scan your computer again. If DDTray.exe still remains in the scan result, proceed with the next step. If DDTray.exe is gone from the scan result you're done.
  7. If DDTray.exe still remains in the scan result, check its checkbox again in the scan result and click Fix.
  8. Restart your computer.
  9. Start FreeFixer and scan your computer again. Verify that DDTray.exe no longer appear in the scan result.
Please select the option that best describe your thoughts on the removal instructions given above








Free Questionnaires

Other files also named DDTray.exe

DDTray.exe (104 votes)

Hashes [?]

PropertyValue
MD5731397aec2e2059d787c805bc9a1dd86
SHA2561e6c34dbff9e8388f71c88eb474036ef84f2a1e5e445fa878dbd3b4329ed9fb5

Error Messages

These are some of the error messages that can appear related to ddtray.exe:

ddtray.exe has encountered a problem and needs to close. We are sorry for the inconvenience.

ddtray.exe - Application Error. The instruction at "0xXXXXXXXX" referenced memory at "0xXXXXXXXX". The memory could not be "read/written". Click on OK to terminate the program.

Device Doctor Tray has stopped working.

End Program - ddtray.exe. This program is not responding.

ddtray.exe is not a valid Win32 application.

ddtray.exe - Application Error. The application failed to initialize properly (0xXXXXXXXX). Click OK to terminate the application.

What will you do with DDTray.exe?

To help other users, please let us know what you will do with DDTray.exe:



Comments

Please share with the other users what you think about this file. What does this file do? Is it legitimate or something that your computer is better without? Do you know how it was installed on your system? Did you install it yourself or did it come bundled with some other software? Is it running smoothly or do you get some error message? Any information that will help to document this file is welcome. Thank you for your contributions.

I'm reading all new comments so don't hesitate to post a question about the file. If I don't have the answer perhaps another user can help you.

No comments posted yet.

Leave a reply