VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: | - |
Threat Names: |
Gen:Variant.Ransom.Ragnar.11
Mal/Generic-S
|
rxodge.exe
Windows Exe (x86-32)
Created at 2020-07-30T12:04:00
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
File Reputation Information
»
Severity |
Blacklisted
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x404240 |
Size Of Code | 0x8400 |
Size Of Initialized Data | 0x5a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2020-07-22 11:43:41+00:00 |
Sections (6)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x826f | 0x8400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.49 |
.rdata | 0x40a000 | 0x1774 | 0x1800 | 0x8800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.31 |
.data | 0x40c000 | 0x968 | 0x200 | 0xa000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.2 |
.edata | 0x40d000 | 0x2e70 | 0x3000 | 0xa200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.35 |
.rsrc | 0x410000 | 0x1e0 | 0x200 | 0xd200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.69 |
.reloc | 0x411000 | 0x4f8 | 0x600 | 0xd400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.04 |
Imports (6)
»
KERNEL32.dll (72)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetTickCount | 0x0 | 0x40a080 | 0xade0 | 0x95e0 | 0x293 |
MapViewOfFile | 0x0 | 0x40a084 | 0xade4 | 0x95e4 | 0x357 |
UnmapViewOfFile | 0x0 | 0x40a088 | 0xade8 | 0x95e8 | 0x4d6 |
lstrcmpiW | 0x0 | 0x40a08c | 0xadec | 0x95ec | 0x545 |
lstrcpyA | 0x0 | 0x40a090 | 0xadf0 | 0x95f0 | 0x547 |
lstrcpyW | 0x0 | 0x40a094 | 0xadf4 | 0x95f4 | 0x548 |
lstrcatW | 0x0 | 0x40a098 | 0xadf8 | 0x95f8 | 0x53f |
lstrlenA | 0x0 | 0x40a09c | 0xadfc | 0x95fc | 0x54d |
lstrlenW | 0x0 | 0x40a0a0 | 0xae00 | 0x9600 | 0x54e |
CreateEventW | 0x0 | 0x40a0a4 | 0xae04 | 0x9604 | 0x85 |
CreateFileMappingW | 0x0 | 0x40a0a8 | 0xae08 | 0x9608 | 0x8c |
LoadLibraryW | 0x0 | 0x40a0ac | 0xae0c | 0x960c | 0x33f |
CreateProcessW | 0x0 | 0x40a0b0 | 0xae10 | 0x9610 | 0xa8 |
GetStartupInfoW | 0x0 | 0x40a0b4 | 0xae14 | 0x9614 | 0x263 |
GetCommandLineW | 0x0 | 0x40a0b8 | 0xae18 | 0x9618 | 0x187 |
GetDriveTypeW | 0x0 | 0x40a0bc | 0xae1c | 0x961c | 0x1d3 |
GetSystemDirectoryW | 0x0 | 0x40a0c0 | 0xae20 | 0x9620 | 0x270 |
GetWindowsDirectoryW | 0x0 | 0x40a0c4 | 0xae24 | 0x9624 | 0x2af |
GetFullPathNameW | 0x0 | 0x40a0c8 | 0xae28 | 0x9628 | 0x1fb |
CloseHandle | 0x0 | 0x40a0cc | 0xae2c | 0x962c | 0x52 |
SetFileAttributesW | 0x0 | 0x40a0d0 | 0xae30 | 0x9630 | 0x461 |
GetFileAttributesW | 0x0 | 0x40a0d4 | 0xae34 | 0x9634 | 0x1ea |
FindFirstFileExW | 0x0 | 0x40a0d8 | 0xae38 | 0x9638 | 0x134 |
FindNextFileW | 0x0 | 0x40a0dc | 0xae3c | 0x963c | 0x145 |
CopyFileW | 0x0 | 0x40a0e0 | 0xae40 | 0x9640 | 0x75 |
MoveFileExW | 0x0 | 0x40a0e4 | 0xae44 | 0x9644 | 0x360 |
GetVolumeInformationA | 0x0 | 0x40a0e8 | 0xae48 | 0x9648 | 0x2a5 |
GetVolumeInformationW | 0x0 | 0x40a0ec | 0xae4c | 0x964c | 0x2a7 |
GetComputerNameW | 0x0 | 0x40a0f0 | 0xae50 | 0x9650 | 0x18f |
FindFirstVolumeA | 0x0 | 0x40a0f4 | 0xae54 | 0x9654 | 0x13c |
FindNextVolumeA | 0x0 | 0x40a0f8 | 0xae58 | 0x9658 | 0x147 |
FindVolumeClose | 0x0 | 0x40a0fc | 0xae5c | 0x965c | 0x150 |
SetVolumeMountPointA | 0x0 | 0x40a100 | 0xae60 | 0x9660 | 0x4aa |
GetVolumePathNamesForVolumeNameA | 0x0 | 0x40a104 | 0xae64 | 0x9664 | 0x2ac |
WTSGetActiveConsoleSessionId | 0x0 | 0x40a108 | 0xae68 | 0x9668 | 0x4f4 |
MultiByteToWideChar | 0x0 | 0x40a10c | 0xae6c | 0x966c | 0x367 |
WideCharToMultiByte | 0x0 | 0x40a110 | 0xae70 | 0x9670 | 0x511 |
GetLocaleInfoW | 0x0 | 0x40a114 | 0xae74 | 0x9674 | 0x206 |
CreateToolhelp32Snapshot | 0x0 | 0x40a118 | 0xae78 | 0x9678 | 0xbe |
Process32FirstW | 0x0 | 0x40a11c | 0xae7c | 0x967c | 0x396 |
Process32NextW | 0x0 | 0x40a120 | 0xae80 | 0x9680 | 0x398 |
GetNativeSystemInfo | 0x0 | 0x40a124 | 0xae84 | 0x9684 | 0x225 |
FindClose | 0x0 | 0x40a128 | 0xae88 | 0x9688 | 0x12e |
SetFilePointerEx | 0x0 | 0x40a12c | 0xae8c | 0x968c | 0x467 |
ReadFile | 0x0 | 0x40a130 | 0xae90 | 0x9690 | 0x3c0 |
DeviceIoControl | 0x0 | 0x40a134 | 0xae94 | 0x9694 | 0xdd |
WriteFile | 0x0 | 0x40a138 | 0xae98 | 0x9698 | 0x525 |
GetFileSizeEx | 0x0 | 0x40a13c | 0xae9c | 0x969c | 0x1f1 |
GetFileSize | 0x0 | 0x40a140 | 0xaea0 | 0x96a0 | 0x1f0 |
UnlockFile | 0x0 | 0x40a144 | 0xaea4 | 0x96a4 | 0x4d4 |
LockFile | 0x0 | 0x40a148 | 0xaea8 | 0x96a8 | 0x352 |
GetLogicalDrives | 0x0 | 0x40a14c | 0xaeac | 0x96ac | 0x209 |
Sleep | 0x0 | 0x40a150 | 0xaeb0 | 0x96b0 | 0x4b2 |
WaitForMultipleObjects | 0x0 | 0x40a154 | 0xaeb4 | 0x96b4 | 0x4f7 |
WaitForSingleObject | 0x0 | 0x40a158 | 0xaeb8 | 0x96b8 | 0x4f9 |
SetEvent | 0x0 | 0x40a15c | 0xaebc | 0x96bc | 0x459 |
GetLastError | 0x0 | 0x40a160 | 0xaec0 | 0x96c0 | 0x202 |
TerminateThread | 0x0 | 0x40a164 | 0xaec4 | 0x96c4 | 0x4c1 |
CreateThread | 0x0 | 0x40a168 | 0xaec8 | 0x96c8 | 0xb5 |
TerminateProcess | 0x0 | 0x40a16c | 0xaecc | 0x96cc | 0x4c0 |
ExitProcess | 0x0 | 0x40a170 | 0xaed0 | 0x96d0 | 0x119 |
GetCurrentProcess | 0x0 | 0x40a174 | 0xaed4 | 0x96d4 | 0x1c0 |
OpenProcess | 0x0 | 0x40a178 | 0xaed8 | 0x96d8 | 0x380 |
GetProcessHeap | 0x0 | 0x40a17c | 0xaedc | 0x96dc | 0x24a |
HeapFree | 0x0 | 0x40a180 | 0xaee0 | 0x96e0 | 0x2cf |
HeapAlloc | 0x0 | 0x40a184 | 0xaee4 | 0x96e4 | 0x2cb |
VirtualFree | 0x0 | 0x40a188 | 0xaee8 | 0x96e8 | 0x4ec |
VirtualAlloc | 0x0 | 0x40a18c | 0xaeec | 0x96ec | 0x4e9 |
LocalFree | 0x0 | 0x40a190 | 0xaef0 | 0x96f0 | 0x348 |
LocalAlloc | 0x0 | 0x40a194 | 0xaef4 | 0x96f4 | 0x344 |
CreateFileW | 0x0 | 0x40a198 | 0xaef8 | 0x96f8 | 0x8f |
GetProcAddress | 0x0 | 0x40a19c | 0xaefc | 0x96fc | 0x245 |
USER32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
wsprintfW | 0x0 | 0x40a1c4 | 0xaf24 | 0x9724 | 0x333 |
wsprintfA | 0x0 | 0x40a1c8 | 0xaf28 | 0x9728 | 0x332 |
ADVAPI32.dll (26)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CryptGenRandom | 0x0 | 0x40a000 | 0xad60 | 0x9560 | 0xc1 |
CryptReleaseContext | 0x0 | 0x40a004 | 0xad64 | 0x9564 | 0xcb |
SetNamedSecurityInfoW | 0x0 | 0x40a008 | 0xad68 | 0x9568 | 0x2b1 |
GetNamedSecurityInfoW | 0x0 | 0x40a00c | 0xad6c | 0x956c | 0x142 |
SetEntriesInAclW | 0x0 | 0x40a010 | 0xad70 | 0x9570 | 0x2a6 |
QueryServiceStatusEx | 0x0 | 0x40a014 | 0xad74 | 0x9574 | 0x229 |
OpenServiceA | 0x0 | 0x40a018 | 0xad78 | 0x9578 | 0x1fa |
OpenSCManagerA | 0x0 | 0x40a01c | 0xad7c | 0x957c | 0x1f8 |
EnumServicesStatusA | 0x0 | 0x40a020 | 0xad80 | 0x9580 | 0xff |
EnumDependentServicesA | 0x0 | 0x40a024 | 0xad84 | 0x9584 | 0xfc |
ControlService | 0x0 | 0x40a028 | 0xad88 | 0x9588 | 0x5c |
CloseServiceHandle | 0x0 | 0x40a02c | 0xad8c | 0x958c | 0x57 |
CryptEncrypt | 0x0 | 0x40a030 | 0xad90 | 0x9590 | 0xba |
CryptDestroyKey | 0x0 | 0x40a034 | 0xad94 | 0x9594 | 0xb7 |
CryptAcquireContextW | 0x0 | 0x40a038 | 0xad98 | 0x9598 | 0xb1 |
RegQueryValueExW | 0x0 | 0x40a03c | 0xad9c | 0x959c | 0x26e |
RegOpenKeyExW | 0x0 | 0x40a040 | 0xada0 | 0x95a0 | 0x261 |
RegCloseKey | 0x0 | 0x40a044 | 0xada4 | 0x95a4 | 0x230 |
DuplicateTokenEx | 0x0 | 0x40a048 | 0xada8 | 0x95a8 | 0xdf |
CreateProcessAsUserW | 0x0 | 0x40a04c | 0xadac | 0x95ac | 0x7c |
GetUserNameW | 0x0 | 0x40a050 | 0xadb0 | 0x95b0 | 0x165 |
LookupPrivilegeValueW | 0x0 | 0x40a054 | 0xadb4 | 0x95b4 | 0x197 |
AllocateAndInitializeSid | 0x0 | 0x40a058 | 0xadb8 | 0x95b8 | 0x20 |
AdjustTokenPrivileges | 0x0 | 0x40a05c | 0xadbc | 0x95bc | 0x1f |
SetTokenInformation | 0x0 | 0x40a060 | 0xadc0 | 0x95c0 | 0x2c2 |
OpenProcessToken | 0x0 | 0x40a064 | 0xadc4 | 0x95c4 | 0x1f7 |
SHELL32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SHGetSpecialFolderPathW | 0x0 | 0x40a1a4 | 0xaf04 | 0x9704 | 0xe1 |
SHEmptyRecycleBinW | 0x0 | 0x40a1a8 | 0xaf08 | 0x9708 | 0xa5 |
CommandLineToArgvW | 0x0 | 0x40a1ac | 0xaf0c | 0x970c | 0x6 |
SHLWAPI.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StrStrIA | 0x0 | 0x40a1b4 | 0xaf14 | 0x9714 | 0x144 |
PathFindExtensionW | 0x0 | 0x40a1b8 | 0xaf18 | 0x9718 | 0x47 |
StrToIntA | 0x0 | 0x40a1bc | 0xaf1c | 0x971c | 0x14b |
CRYPT32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CryptDecodeObjectEx | 0x0 | 0x40a06c | 0xadcc | 0x95cc | 0x83 |
CryptStringToBinaryW | 0x0 | 0x40a070 | 0xadd0 | 0x95d0 | 0xd9 |
CryptBinaryToStringA | 0x0 | 0x40a074 | 0xadd4 | 0x95d4 | 0x7c |
CryptImportPublicKeyInfo | 0x0 | 0x40a078 | 0xadd8 | 0x95d8 | 0xa4 |
Memory Dumps (4)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
rxodge.exe | 1 | 0x00EC0000 | 0x00ED1FFF | First Execution |
![]() |
32-bit | 0x00EC4240 |
![]() |
![]() |
...
|
rxodge.exe | 1 | 0x00EC0000 | 0x00ED1FFF | Content Changed |
![]() |
32-bit | 0x00EC2E30 |
![]() |
![]() |
...
|
rxodge.exe | 1 | 0x00EC0000 | 0x00ED1FFF | Content Changed |
![]() |
32-bit | 0x00EC9210 |
![]() |
![]() |
...
|
rxodge.exe | 1 | 0x00EC0000 | 0x00ED1FFF | Process Termination |
![]() |
32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.Ransom.Ragnar.11 |
Malicious
|
c:\users\fd1hvy\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-1051304884-625712362-2192934891-1000\ec679dec92129330b5b05a3aa424ac05_33d770d0-06bc-47c5-8714-222cdac43a71 | Modified File | Stream |
Whitelisted
|
...
|
»
c:\$recycle.bin\s-1-5-21-1051304884-625712362-2192934891-1000\desktop.ini | Dropped File | Unknown |
Whitelisted
|
...
|
»
File Reputation Information
»
Severity |
Whitelisted
|
\\?\C:\$GetCurrent\Logs\downlevel_2017_09_07_02_02_39_766.log.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\$GetCurrent\Logs\oobe_2017_09_07_03_08_57_737.log.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\$GetCurrent\Logs\PartnerSetupCompleteResult.log.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\$GetCurrent\SafeOS\GetCurrentRollback.ini | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\$GetCurrent\SafeOS\PartnerSetupComplete.cmd | Modified File | Batch |
Unknown
|
...
|
»
\\?\C:\$GetCurrent\SafeOS\preoobe.cmd | Modified File | Batch |
Unknown
|
...
|
»
\\?\C:\$GetCurrent\SafeOS\SetupComplete.cmd.ragn@r_B8CF767A | Dropped File | Batch |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1025\eula.rtf.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1025\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1028\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1028\LocalizedData.xml.ragn@r_B8CF767A | Dropped File | Binary |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1029\eula.rtf.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1029\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1030\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1030\LocalizedData.xml.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1031\eula.rtf.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1031\LocalizedData.xml.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1032\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1032\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1033\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1033\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1035\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1035\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1036\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1036\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1037\eula.rtf.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1037\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1038\LocalizedData.xml.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1038\eula.rtf.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1040\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1040\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1041\eula.rtf.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1041\LocalizedData.xml.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1042\eula.rtf.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1042\LocalizedData.xml.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1043\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1043\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1044\eula.rtf.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1044\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1045\eula.rtf.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1045\LocalizedData.xml.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1046\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1046\LocalizedData.xml.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1049\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1049\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1053\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1053\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1055\eula.rtf.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\1055\LocalizedData.xml.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\2052\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\2052\LocalizedData.xml.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\2070\eula.rtf.ragn@r_B8CF767A | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\588bce7c90097ed212\2070\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\$GetCurrent\!$R4GN4R_B8CF767A$!.txt | Dropped File | Text |
Unknown
|
...
|
»
C:\WINDOWS\System32\spp\store\2.0\data.dat | Dropped File | Stream |
Unknown
|
...
|
»