VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: Ransomware, Downloader, Trojan |
Hermes.exe
Windows Exe (x86-32)
Created at 2019-05-24T16:55:00
Remarks
(0x200000c): The maximum memory dump size was exceeded. Some dumps may be missing in the report.
(0x200001b): The maximum number of file reputation requests per analysis (20) was exceeded.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
File Reputation Information
»
Severity |
Suspicious
|
First Seen | 2019-05-19 21:11 (UTC+2) |
Last Seen | 2019-05-23 17:02 (UTC+2) |
Names | Win32.Trojan.Encoder |
Families | Encoder |
Classification | Trojan |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x82ed56 |
Size Of Code | 0x19800 |
Size Of Initialized Data | 0x3da00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2012-07-13 22:47:16+00:00 |
Version Information (11)
»
Assembly Version | 1.0.0.0 |
Comments | - |
CompanyName | windows |
FileDescription | Hermes |
FileVersion | 1.0.0.0 |
InternalName | Hermes.exe |
LegalCopyright | Copyright © 2019 |
LegalTrademarks | - |
OriginalFilename | Hermes.exe |
ProductName | Hermes |
ProductVersion | 1.0.0.0 |
Sections (6)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x19718 | 0x0 | 0x0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 0.0 |
.rdata | 0x41b000 | 0x6db4 | 0x0 | 0x0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 0.0 |
.data | 0x422000 | 0x30c0 | 0x0 | 0x0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.1110 | 0x426000 | 0x345ea4 | 0x0 | 0x0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 0.0 |
.1111 | 0x76c000 | 0x5463a0 | 0x546400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.96 |
.rsrc | 0xcb3000 | 0x198ba | 0x19a00 | 0x546800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.47 |
Imports (8)
»
KERNEL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RaiseException | 0x0 | 0xc20000 | 0x489964 | 0x11dd64 | 0x0 |
ole32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
OleInitialize | 0x0 | 0xc20008 | 0x48996c | 0x11dd6c | 0x0 |
OLEAUT32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SafeArrayCreate | 0xf | 0xc20010 | 0x489974 | 0x11dd74 | - |
WTSAPI32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WTSSendMessageW | 0x0 | 0xc20018 | 0x48997c | 0x11dd7c | 0x0 |
KERNEL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
VirtualQuery | 0x0 | 0xc20020 | 0x489984 | 0x11dd84 | 0x0 |
USER32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetUserObjectInformationW | 0x0 | 0xc20028 | 0x48998c | 0x11dd8c | 0x0 |
KERNEL32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LocalAlloc | 0x0 | 0xc20030 | 0x489994 | 0x11dd94 | 0x0 |
LocalFree | 0x0 | 0xc20034 | 0x489998 | 0x11dd98 | 0x0 |
GetModuleFileNameW | 0x0 | 0xc20038 | 0x48999c | 0x11dd9c | 0x0 |
GetProcessAffinityMask | 0x0 | 0xc2003c | 0x4899a0 | 0x11dda0 | 0x0 |
SetProcessAffinityMask | 0x0 | 0xc20040 | 0x4899a4 | 0x11dda4 | 0x0 |
SetThreadAffinityMask | 0x0 | 0xc20044 | 0x4899a8 | 0x11dda8 | 0x0 |
Sleep | 0x0 | 0xc20048 | 0x4899ac | 0x11ddac | 0x0 |
ExitProcess | 0x0 | 0xc2004c | 0x4899b0 | 0x11ddb0 | 0x0 |
FreeLibrary | 0x0 | 0xc20050 | 0x4899b4 | 0x11ddb4 | 0x0 |
LoadLibraryA | 0x0 | 0xc20054 | 0x4899b8 | 0x11ddb8 | 0x0 |
GetModuleHandleA | 0x0 | 0xc20058 | 0x4899bc | 0x11ddbc | 0x0 |
GetProcAddress | 0x0 | 0xc2005c | 0x4899c0 | 0x11ddc0 | 0x0 |
USER32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetProcessWindowStation | 0x0 | 0xc20064 | 0x4899c8 | 0x11ddc8 | 0x0 |
GetUserObjectInformationW | 0x0 | 0xc20068 | 0x4899cc | 0x11ddcc | 0x0 |
Memory Dumps (17)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuilds | Bitness | Entry Points | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
hermes.exe | 1 | 0x00400000 | 0x00CCCFFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x001E0000 | 0x001E0FFF | Marked Executable | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x001F0000 | 0x001F0FFF | Marked Executable | - | 32-bit | 0x001F0015 |
![]() |
![]() |
...
|
buffer | 1 | 0x00DE0000 | 0x00DE0FFF | Marked Executable | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x00E10000 | 0x00E10FFF | Marked Executable | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x00E20000 | 0x00E20FFF | Marked Executable | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x00F40000 | 0x00F40FFF | Marked Executable | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x028F0000 | 0x028F0FFF | First Execution | - | 32-bit | 0x028F000F |
![]() |
![]() |
...
|
buffer | 1 | 0x02900000 | 0x02900FFF | Marked Executable | - | 32-bit | - |
![]() |
![]() |
...
|
system.ni.dll | 1 | 0x71DD0000 | 0x727AEFFF | Content Changed | - | 32-bit | 0x71F0D4A8, 0x71F8CDE0, ... |
![]() |
![]() |
...
|
system.ni.dll | 1 | 0x71DD0000 | 0x727AEFFF | Content Changed | - | 32-bit | 0x71F0D2C0, 0x71F483B4 |
![]() |
![]() |
...
|
system.ni.dll | 1 | 0x71DD0000 | 0x727AEFFF | Content Changed | - | 32-bit | 0x71FECE60 |
![]() |
![]() |
...
|
system.ni.dll | 1 | 0x71DD0000 | 0x727AEFFF | Content Changed | - | 32-bit | 0x71F13D60, 0x71F0E7D0 |
![]() |
![]() |
...
|
system.ni.dll | 1 | 0x71DD0000 | 0x727AEFFF | Content Changed | - | 32-bit | 0x71FE9374, 0x71F13D60 |
![]() |
![]() |
...
|
system.ni.dll | 1 | 0x71DD0000 | 0x727AEFFF | Content Changed | - | 32-bit | 0x71FED000 |
![]() |
![]() |
...
|
system.ni.dll | 1 | 0x71DD0000 | 0x727AEFFF | Content Changed | - | 32-bit | 0x71F8D254 |
![]() |
![]() |
...
|
system.ni.dll | 1 | 0x71DD0000 | 0x727AEFFF | Content Changed | - | 32-bit | 0x71F0BBA0 |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.Ransom.1660 |
Malicious
|
C:\FD1HVy\Hermes-decrypter-new.exe | Downloaded File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Suspicious
|
First Seen | 2019-05-22 21:26 (UTC+2) |
Last Seen | 2019-05-24 06:23 (UTC+2) |
Names | Win32.Trojan.Razy |
Families | Razy |
Classification | Trojan |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x839a87 |
Size Of Code | 0x19800 |
Size Of Initialized Data | 0x3ae00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2012-07-13 22:47:16+00:00 |
Version Information (11)
»
Assembly Version | 1.0.0.0 |
Comments | - |
CompanyName | - |
FileDescription | Hermes-decrypter |
FileVersion | 1.0.0.0 |
InternalName | Hermes-decrypter.exe |
LegalCopyright | Copyright © 2019 |
LegalTrademarks | - |
OriginalFilename | Hermes-decrypter.exe |
ProductName | Hermes-decrypter |
ProductVersion | 1.0.0.0 |
Sections (6)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x19718 | 0x0 | 0x0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 0.0 |
.rdata | 0x41b000 | 0x6db4 | 0x0 | 0x0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 0.0 |
.data | 0x422000 | 0x30c0 | 0x0 | 0x0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.2220 | 0x426000 | 0x355cae | 0x0 | 0x0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 0.0 |
.2221 | 0x77c000 | 0x553d00 | 0x553e00 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.96 |
.rsrc | 0xcd0000 | 0x48b2 | 0x4a00 | 0x554200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.3 |
Imports (8)
»
KERNEL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RaiseException | 0x0 | 0x87d000 | 0x7d44e8 | 0x4588e8 | 0x0 |
ole32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
OleInitialize | 0x0 | 0x87d008 | 0x7d44f0 | 0x4588f0 | 0x0 |
OLEAUT32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SafeArrayCreate | 0xf | 0x87d010 | 0x7d44f8 | 0x4588f8 | - |
WTSAPI32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WTSSendMessageW | 0x0 | 0x87d018 | 0x7d4500 | 0x458900 | 0x0 |
KERNEL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
VirtualQuery | 0x0 | 0x87d020 | 0x7d4508 | 0x458908 | 0x0 |
USER32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetUserObjectInformationW | 0x0 | 0x87d028 | 0x7d4510 | 0x458910 | 0x0 |
KERNEL32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LocalAlloc | 0x0 | 0x87d030 | 0x7d4518 | 0x458918 | 0x0 |
LocalFree | 0x0 | 0x87d034 | 0x7d451c | 0x45891c | 0x0 |
GetModuleFileNameW | 0x0 | 0x87d038 | 0x7d4520 | 0x458920 | 0x0 |
GetProcessAffinityMask | 0x0 | 0x87d03c | 0x7d4524 | 0x458924 | 0x0 |
SetProcessAffinityMask | 0x0 | 0x87d040 | 0x7d4528 | 0x458928 | 0x0 |
SetThreadAffinityMask | 0x0 | 0x87d044 | 0x7d452c | 0x45892c | 0x0 |
Sleep | 0x0 | 0x87d048 | 0x7d4530 | 0x458930 | 0x0 |
ExitProcess | 0x0 | 0x87d04c | 0x7d4534 | 0x458934 | 0x0 |
FreeLibrary | 0x0 | 0x87d050 | 0x7d4538 | 0x458938 | 0x0 |
LoadLibraryA | 0x0 | 0x87d054 | 0x7d453c | 0x45893c | 0x0 |
GetModuleHandleA | 0x0 | 0x87d058 | 0x7d4540 | 0x458940 | 0x0 |
GetProcAddress | 0x0 | 0x87d05c | 0x7d4544 | 0x458944 | 0x0 |
USER32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetProcessWindowStation | 0x0 | 0x87d064 | 0x7d454c | 0x45894c | 0x0 |
GetUserObjectInformationW | 0x0 | 0x87d068 | 0x7d4550 | 0x458950 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.Razy.491933 |
Malicious
|
C:\Users\FD1HVy\Desktop\-t3hSggSt8.csv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\-wiWbBcmoqutvw1S.odt | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\NwrDTZ.docx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\kUVq_ b-BGEv YRT\fhdgh_AfpkHHBB9_QqtI\Yzb93Q82DMI82wO\4Mx7zT82zOjgkV9spUg.png | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\kUVq_ b-BGEv YRT\fhdgh_AfpkHHBB9_QqtI\Yzb93Q82DMI82wO\teY6IrO7ujB.jpg | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents\1v32WDK.pptx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents\4z4 82v.xlsx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents\9dHCFyZ_.odt | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents\BZh3 QA3w.xlsx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents\IDj9.docx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents\oK6_.pptx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents\X7xxXdVkKAI.pptx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents\kqnw_pPQeZHhvh\iPxRamNOgEfL6vt-WkOO\RwxQrbJr.rtf | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents\kqnw_pPQeZHhvh\iPxRamNOgEfL6vt-WkOO\77bIp480yHDf0\Hi Fm0SkJi.pdf | Modified File |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents\kqnw_pPQeZHhvh\iPxRamNOgEfL6vt-WkOO\77bIp480yHDf0\pjQnM18Yq7so0m2EOvAa.csv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents\kqnw_pPQeZHhvh\iPxRamNOgEfL6vt-WkOO\HhXhtU9gOiLGZ\6Py75SwYl1UPRzmW_N.csv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents\kqnw_pPQeZHhvh\iPxRamNOgEfL6vt-WkOO\PVOgT\jDPo.xls | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents\kqnw_pPQeZHhvh\iPxRamNOgEfL6vt-WkOO\PVOgT\oKefxkUyIL.xls | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\0YuVxzeY9-b4MF.avi | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop\dudTlSq3.mp3 | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop\du_y8ZA.bmp | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop\hIJHv_tpsSRLGQkXt1.mkv | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop\kXyvY.bmp | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop\ljwNeYj.avi | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop\mJmzsgIR.avi | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop\OZa1OvHSiPZtGYMnr.avi | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop\RSUbGrWMOv90jjgcKmCA.jpg | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop\uy _qJUK.mp3 | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop\Vmnx49O7kGj.png | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop\kUVq_ b-BGEv YRT\fhdgh_AfpkHHBB9_QqtI\K6Z4SfIpaB.mkv | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop\kUVq_ b-BGEv YRT\fhdgh_AfpkHHBB9_QqtI\TfNW1f m7CX1OiM.xls | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop\kUVq_ b-BGEv YRT\fhdgh_AfpkHHBB9_QqtI\Yzb93Q82DMI82wO\nVeBdFzvpwwtXC.mp3 | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\--8WWFRhf0b.pptx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\6jL9GY5.xlsx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\Am2R.docx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\ayhyoBKV0xMLiy.docx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\pFdPoLW.docx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\uZFTfGR0J-cG.pptx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\v2OWp_Gc8AHT3d4nGyy.docx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\V_Zl34r.xlsx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\xpmGmPcch3uV.xlsx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\kqnw_pPQeZHhvh\iPxRamNOgEfL6vt-WkOO\5hwK.doc | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\kqnw_pPQeZHhvh\iPxRamNOgEfL6vt-WkOO\NeCh.csv | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\kqnw_pPQeZHhvh\iPxRamNOgEfL6vt-WkOO\77bIp480yHDf0\47y8mp0s.csv | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\kqnw_pPQeZHhvh\iPxRamNOgEfL6vt-WkOO\HhXhtU9gOiLGZ\hy UYGYQM9MBJYSeMTx.ppt | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\kqnw_pPQeZHhvh\iPxRamNOgEfL6vt-WkOO\HhXhtU9gOiLGZ\pFzSit0y49o.odt | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\kqnw_pPQeZHhvh\iPxRamNOgEfL6vt-WkOO\HhXhtU9gOiLGZ\So7sQ6gpKdfTrbp.ppt | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\kqnw_pPQeZHhvh\iPxRamNOgEfL6vt-WkOO\PVOgT\43Z39pBBrj.pptx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\kqnw_pPQeZHhvh\iPxRamNOgEfL6vt-WkOO\PVOgT\kryOh-FNUXNCWUA.xls | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents\kqnw_pPQeZHhvh\iPxRamNOgEfL6vt-WkOO\PVOgT\yOtj RSlDnhyJi.xlsx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop\HOW TO DECRYPT FILES.txt | Dropped File | Text |
Not Queried
|
...
|
»