- Joined
- Dec 7, 2020
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
if you disable sample submission via group policy, windows defender will REPORT ITSELF because "something" blocked the registry entry from being written to...I found WinDefender to be a resource hog and it will try to re-enable itself even if you go out of your way to disable it. It has a high rate of false positives, eg. Repacks, keygens patches tends to flag as trojans for no good reason.
They even had a serious CPU leak issue that took 5 years to be fixed.
But as far as free antivirus solutions go it's one of the best. I wouldn't touch Avast with a 10ft pole nowadays.
Initially I thought WD was getting a ton of false positives until I set up BSA and Sandboxie to see what was actually going on when you ran the keygens. Turns out the keygens I thought was a false positives actually did do some shit it shouldn't have been doing if all it needed to do was generate keys, though unclear if the shit they did would have been useful to a hacker anymore since a lot of them were over 10 years old....I found WinDefender to be a resource hog and it will try to re-enable itself even if you go out of your way to disable it. It has a high rate of false positives, eg. Repacks, keygens patches tends to flag as trojans for no good reason.
They even had a serious CPU leak issue that took 5 years to be fixed.
But as far as free antivirus solutions go it's one of the best. I wouldn't touch Avast with a 10ft pole nowadays.
What did you see those keygens do?Initially I thought WD was getting a ton of false positives until I set up BSA and Sandboxie to see what was actually going on when you ran the keygens. Turns out the keygens I thought was a false positives actually did do some shit it shouldn't have been doing if all it needed to do was generate keys, though unclear if the shit they did would have been useful to a hacker anymore since a lot of them were over 10 years old.
tl;dr those might not be positives that are quite as false as you think.
I sandboxed my most used one, ran it again, then used BSA to spit out a report:I don't regret buccaneering their lifetime subscription with a random key I found online, but eventually that has come to pass too when they cracked down on it and gave me a free 1 year premium subscription.
What did you see those keygens do?
Detailed report of suspicious malware actions:
Created a mutex named: SBIE_VCM_Mutex
Detected keylogger functionality
Error reporting dialog change: machine\software\microsoft\windows\windows error reporting\dontshowui = 00000001
File handling change: machine\software\classes\undecided\shell\open\command = "c:\program files\sandboxie-plus\start.exe" open_with "%1"
File handling change: machine\software\classes\unknown\shell\open\command = "c:\program files\sandboxie-plus\start.exe" open_with "%1"
File handling change: machine\software\classes\unknown\shell\openas\command = "c:\program files\sandboxie-plus\start.exe" open_with "%1"
File handling change: machine\software\classes\unknown\shell\openwithsetdefaulton\command = "c:\program files\sandboxie-plus\start.exe" open_with "%1"
Got input locale identifiers
Hid file from user: C:\Windows\SbiePst.dat
Queried DNS: contacts.google.com
Queried DNS: signaler-pa.clients6.google.com
Queried DNS: t8.dropbox.com
Traces of Max++
I sandboxed my most used one, ran it again, then used BSA to spit out a report:
Code:Detailed report of suspicious malware actions: Created a mutex named: SBIE_VCM_Mutex Detected keylogger functionality Error reporting dialog change: machine\software\microsoft\windows\windows error reporting\dontshowui = 00000001 File handling change: machine\software\classes\undecided\shell\open\command = "c:\program files\sandboxie-plus\start.exe" open_with "%1" File handling change: machine\software\classes\unknown\shell\open\command = "c:\program files\sandboxie-plus\start.exe" open_with "%1" File handling change: machine\software\classes\unknown\shell\openas\command = "c:\program files\sandboxie-plus\start.exe" open_with "%1" File handling change: machine\software\classes\unknown\shell\openwithsetdefaulton\command = "c:\program files\sandboxie-plus\start.exe" open_with "%1" Got input locale identifiers Hid file from user: C:\Windows\SbiePst.dat Queried DNS: contacts.google.com Queried DNS: signaler-pa.clients6.google.com Queried DNS: t8.dropbox.com Traces of Max++
That's good enough to get me to run all keygens sandboxed from now on, after all they shouldn't be doing ANYTHING but spitting out keys, but perhaps I'm just retarded.
not sure I'm reading this wrong, but did it try to change that files TO open with sandboxie-plus (which I assume was the box you're running) or FROM? and if from, to what exactly?I sandboxed my most used one, ran it again, then used BSA to spit out a report:
Code:Detailed report of suspicious malware actions: Created a mutex named: SBIE_VCM_Mutex Detected keylogger functionality Error reporting dialog change: machine\software\microsoft\windows\windows error reporting\dontshowui = 00000001 File handling change: machine\software\classes\undecided\shell\open\command = "c:\program files\sandboxie-plus\start.exe" open_with "%1" File handling change: machine\software\classes\unknown\shell\open\command = "c:\program files\sandboxie-plus\start.exe" open_with "%1" File handling change: machine\software\classes\unknown\shell\openas\command = "c:\program files\sandboxie-plus\start.exe" open_with "%1" File handling change: machine\software\classes\unknown\shell\openwithsetdefaulton\command = "c:\program files\sandboxie-plus\start.exe" open_with "%1" Got input locale identifiers Hid file from user: C:\Windows\SbiePst.dat Queried DNS: contacts.google.com Queried DNS: signaler-pa.clients6.google.com Queried DNS: t8.dropbox.com Traces of Max++
That's good enough to get me to run all keygens sandboxed from now on, after all they shouldn't be doing ANYTHING but spitting out keys, but perhaps I'm just retarded.
why would malware try to set the shortcut to anything but itself? unless it's sandboxie interfering, but then why doesn't it say anything?.In order:
>where
Emule originally, but it was also in a torrent release of the same
>what for and who
CS6 Master Collection, x-force is the release group, keygen actually works really well...outside the poz.
>why is it trying to set something to open with sandboxie
I'm sure that's an artifact of it trying to set some kind of sneaky backdoor, but because it's sandboxed it's pulling that as the executable instead of something more system related under normal circumstances, since it looks like it's setting an open with command to be some executable with the %1 argument tacked on, which looks a lot like the skeleton of a rundll32.exe command or something similar probably.
Best guess it tries to grab something from dropbox (that probably doesn't exist anymore) and that's what it's trying to point to. Given that it also tries to hide something (which ends up being another sandboxie related file, but in a real environment probably is something else) that seems at least plausible.why would malware try to set the shortcut to anything but itself? unless it's sandboxie interfering, but then why doesn't it say anything?.
at this point I'd just put it in a VM and see how it would behave in a "real" windows
Most likely trying to grab some sort of crypto minerBest guess it tries to grab something from dropbox (that probably doesn't exist anymore) and that's what it's trying to point to.
Old releases can't be trusted, not because they're bad but because they've passed through a lot of hands over the years. Out of curiosity I have downloaded things(mostly old games) from abandonware sites where the crack or keygen is suspect when compared to the original scene release even though they should be one and the same. One gets flagged while the original one passes just fine.In order:
>where
Emule originally, but it was also in a torrent release of the same
>what for and who
CS6 Master Collection, x-force is the release group, keygen actually works really well...outside the poz.
>why is it trying to set something to open with sandboxie
I'm sure that's an artifact of it trying to set some kind of sneaky backdoor, but because it's sandboxed it's pulling that as the executable instead of something more system related under normal circumstances, since it looks like it's setting an open with command to be some executable with the %1 argument tacked on, which looks a lot like the skeleton of a rundll32.exe command or something similar probably.