VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Ransomware
|
Threat Names: |
Gen:Variant.Razy.599308
Gen:Variant.Jaik.40100
Mal/Generic-S
|
zes.exe
Windows Exe (x86-32)
Created at 2020-08-07T18:49:00
Remarks (2/2)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "45 seconds" to "30 seconds" to reveal dormant functionality.
Master Boot Record Changes
»
Sector Number | Sector Size | Actions |
---|---|---|
2063 | 512 Bytes |
...
|
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\zes.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x406850 |
Size Of Code | 0x7a00 |
Size Of Initialized Data | 0x16800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2020-08-03 13:03:53+00:00 |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x7804 | 0x7a00 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.36 |
.rdata | 0x409000 | 0xd58 | 0xe00 | 0x7e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.05 |
.data | 0x40a000 | 0x13aac | 0x0 | 0x0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.ndata | 0x41e000 | 0x1809 | 0x1a00 | 0x8c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.95 |
.rsrc | 0x420000 | 0x298 | 0x400 | 0xa600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 2.06 |
Imports (6)
»
MPR.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WNetEnumResourceW | 0x0 | 0x409144 | 0x945c | 0x825c | 0x1c |
WNetOpenEnumW | 0x0 | 0x409148 | 0x9460 | 0x8260 | 0x3d |
WNetCloseEnum | 0x0 | 0x40914c | 0x9464 | 0x8264 | 0x10 |
KERNEL32.dll (64)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetFileAttributesW | 0x0 | 0x409040 | 0x9358 | 0x8158 | 0x1ea |
CreateFileW | 0x0 | 0x409044 | 0x935c | 0x815c | 0x8f |
GetLastError | 0x0 | 0x409048 | 0x9360 | 0x8160 | 0x202 |
FindClose | 0x0 | 0x40904c | 0x9364 | 0x8164 | 0x12e |
DeviceIoControl | 0x0 | 0x409050 | 0x9368 | 0x8168 | 0xdd |
WaitForMultipleObjects | 0x0 | 0x409054 | 0x936c | 0x816c | 0x4f7 |
FindNextFileW | 0x0 | 0x409058 | 0x9370 | 0x8170 | 0x145 |
GetVolumeInformationW | 0x0 | 0x40905c | 0x9374 | 0x8174 | 0x2a7 |
CreateThread | 0x0 | 0x409060 | 0x9378 | 0x8178 | 0xb5 |
TryEnterCriticalSection | 0x0 | 0x409064 | 0x937c | 0x817c | 0x4ce |
Sleep | 0x0 | 0x409068 | 0x9380 | 0x8180 | 0x4b2 |
WriteFile | 0x0 | 0x40906c | 0x9384 | 0x8184 | 0x525 |
GetStdHandle | 0x0 | 0x409070 | 0x9388 | 0x8188 | 0x264 |
SetEndOfFile | 0x0 | 0x409074 | 0x938c | 0x818c | 0x453 |
SetFilePointerEx | 0x0 | 0x409078 | 0x9390 | 0x8190 | 0x467 |
ReadFile | 0x0 | 0x40907c | 0x9394 | 0x8194 | 0x3c0 |
GetFileSizeEx | 0x0 | 0x409080 | 0x9398 | 0x8198 | 0x1f1 |
MoveFileW | 0x0 | 0x409084 | 0x939c | 0x819c | 0x363 |
SetFileAttributesW | 0x0 | 0x409088 | 0x93a0 | 0x81a0 | 0x461 |
HeapAlloc | 0x0 | 0x40908c | 0x93a4 | 0x81a4 | 0x2cb |
GetCurrentProcess | 0x0 | 0x409090 | 0x93a8 | 0x81a8 | 0x1c0 |
HeapFree | 0x0 | 0x409094 | 0x93ac | 0x81ac | 0x2cf |
GetProcessHeap | 0x0 | 0x409098 | 0x93b0 | 0x81b0 | 0x24a |
GlobalAlloc | 0x0 | 0x40909c | 0x93b4 | 0x81b4 | 0x2b3 |
GetLogicalDrives | 0x0 | 0x4090a0 | 0x93b8 | 0x81b8 | 0x209 |
GetVersion | 0x0 | 0x4090a4 | 0x93bc | 0x81bc | 0x2a2 |
PeekNamedPipe | 0x0 | 0x4090a8 | 0x93c0 | 0x81c0 | 0x38d |
GetComputerNameW | 0x0 | 0x4090ac | 0x93c4 | 0x81c4 | 0x18f |
SetEvent | 0x0 | 0x4090b0 | 0x93c8 | 0x81c8 | 0x459 |
TerminateThread | 0x0 | 0x4090b4 | 0x93cc | 0x81cc | 0x4c1 |
GetProcAddress | 0x0 | 0x4090b8 | 0x93d0 | 0x81d0 | 0x245 |
LoadLibraryA | 0x0 | 0x4090bc | 0x93d4 | 0x81d4 | 0x33c |
CreateEventW | 0x0 | 0x4090c0 | 0x93d8 | 0x81d8 | 0x85 |
OpenProcess | 0x0 | 0x4090c4 | 0x93dc | 0x81dc | 0x380 |
GetFileType | 0x0 | 0x4090c8 | 0x93e0 | 0x81e0 | 0x1f3 |
GetModuleHandleA | 0x0 | 0x4090cc | 0x93e4 | 0x81e4 | 0x215 |
DuplicateHandle | 0x0 | 0x4090d0 | 0x93e8 | 0x81e8 | 0xe8 |
GetCurrentProcessId | 0x0 | 0x4090d4 | 0x93ec | 0x81ec | 0x1c1 |
ExitProcess | 0x0 | 0x4090d8 | 0x93f0 | 0x81f0 | 0x119 |
GetModuleHandleW | 0x0 | 0x4090dc | 0x93f4 | 0x81f4 | 0x218 |
GetCommandLineW | 0x0 | 0x4090e0 | 0x93f8 | 0x81f8 | 0x187 |
CreatePipe | 0x0 | 0x4090e4 | 0x93fc | 0x81fc | 0xa1 |
GetEnvironmentVariableW | 0x0 | 0x4090e8 | 0x9400 | 0x8200 | 0x1dc |
CreateProcessW | 0x0 | 0x4090ec | 0x9404 | 0x8204 | 0xa8 |
WaitForSingleObject | 0x0 | 0x4090f0 | 0x9408 | 0x8208 | 0x4f9 |
SetHandleInformation | 0x0 | 0x4090f4 | 0x940c | 0x820c | 0x470 |
GetLocaleInfoW | 0x0 | 0x4090f8 | 0x9410 | 0x8210 | 0x206 |
GetModuleFileNameW | 0x0 | 0x4090fc | 0x9414 | 0x8214 | 0x214 |
Process32FirstW | 0x0 | 0x409100 | 0x9418 | 0x8218 | 0x396 |
Process32NextW | 0x0 | 0x409104 | 0x941c | 0x821c | 0x398 |
CreateToolhelp32Snapshot | 0x0 | 0x409108 | 0x9420 | 0x8220 | 0xbe |
CreateDirectoryW | 0x0 | 0x40910c | 0x9424 | 0x8224 | 0x81 |
SetErrorMode | 0x0 | 0x409110 | 0x9428 | 0x8228 | 0x458 |
GetDriveTypeW | 0x0 | 0x409114 | 0x942c | 0x822c | 0x1d3 |
FindFirstFileW | 0x0 | 0x409118 | 0x9430 | 0x8230 | 0x139 |
CloseHandle | 0x0 | 0x40911c | 0x9434 | 0x8234 | 0x52 |
DeleteCriticalSection | 0x0 | 0x409120 | 0x9438 | 0x8238 | 0xd1 |
EnterCriticalSection | 0x0 | 0x409124 | 0x943c | 0x823c | 0xee |
TerminateProcess | 0x0 | 0x409128 | 0x9440 | 0x8240 | 0x4c0 |
GetExitCodeProcess | 0x0 | 0x40912c | 0x9444 | 0x8244 | 0x1df |
LeaveCriticalSection | 0x0 | 0x409130 | 0x9448 | 0x8248 | 0x339 |
InitializeCriticalSection | 0x0 | 0x409134 | 0x944c | 0x824c | 0x2e2 |
GlobalFree | 0x0 | 0x409138 | 0x9450 | 0x8250 | 0x2ba |
GetSystemWindowsDirectoryW | 0x0 | 0x40913c | 0x9454 | 0x8254 | 0x27c |
USER32.dll (24)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DialogBoxParamW | 0x0 | 0x409170 | 0x9488 | 0x8288 | 0xac |
ShowWindow | 0x0 | 0x409174 | 0x948c | 0x828c | 0x2e4 |
MessageBoxW | 0x0 | 0x409178 | 0x9490 | 0x8290 | 0x217 |
SetWindowTextA | 0x0 | 0x40917c | 0x9494 | 0x8294 | 0x2cf |
SendMessageW | 0x0 | 0x409180 | 0x9498 | 0x8298 | 0x280 |
EnableWindow | 0x0 | 0x409184 | 0x949c | 0x829c | 0xd8 |
UnregisterHotKey | 0x0 | 0x409188 | 0x94a0 | 0x82a0 | 0x30d |
GetWindowThreadProcessId | 0x0 | 0x40918c | 0x94a4 | 0x82a4 | 0x1a5 |
RegisterHotKey | 0x0 | 0x409190 | 0x94a8 | 0x82a8 | 0x25a |
GetWindowTextLengthW | 0x0 | 0x409194 | 0x94ac | 0x82ac | 0x1a3 |
CloseClipboard | 0x0 | 0x409198 | 0x94b0 | 0x82b0 | 0x49 |
GetWindowTextA | 0x0 | 0x40919c | 0x94b4 | 0x82b4 | 0x1a1 |
EmptyClipboard | 0x0 | 0x4091a0 | 0x94b8 | 0x82b8 | 0xd5 |
GetDlgItem | 0x0 | 0x4091a4 | 0x94bc | 0x82bc | 0x127 |
OpenClipboard | 0x0 | 0x4091a8 | 0x94c0 | 0x82c0 | 0x228 |
SetClipboardData | 0x0 | 0x4091ac | 0x94c4 | 0x82c4 | 0x28a |
wsprintfW | 0x0 | 0x4091b0 | 0x94c8 | 0x82c8 | 0x339 |
GetShellWindow | 0x0 | 0x4091b4 | 0x94cc | 0x82cc | 0x17a |
SetTimer | 0x0 | 0x4091b8 | 0x94d0 | 0x82d0 | 0x2c0 |
PostMessageW | 0x0 | 0x4091bc | 0x94d4 | 0x82d4 | 0x239 |
KillTimer | 0x0 | 0x4091c0 | 0x94d8 | 0x82d8 | 0x1e4 |
wsprintfA | 0x0 | 0x4091c4 | 0x94dc | 0x82dc | 0x338 |
SetWindowTextW | 0x0 | 0x4091c8 | 0x94e0 | 0x82e0 | 0x2d0 |
EndDialog | 0x0 | 0x4091cc | 0x94e4 | 0x82e4 | 0xda |
ADVAPI32.dll (15)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CryptAcquireContextW | 0x0 | 0x409000 | 0x9318 | 0x8118 | 0xb1 |
CryptSetKeyParam | 0x0 | 0x409004 | 0x931c | 0x811c | 0xcd |
CryptReleaseContext | 0x0 | 0x409008 | 0x9320 | 0x8120 | 0xcb |
CryptGenRandom | 0x0 | 0x40900c | 0x9324 | 0x8124 | 0xc1 |
CryptDestroyKey | 0x0 | 0x409010 | 0x9328 | 0x8128 | 0xb7 |
CryptDecrypt | 0x0 | 0x409014 | 0x932c | 0x812c | 0xb4 |
OpenProcessToken | 0x0 | 0x409018 | 0x9330 | 0x8130 | 0x1f7 |
GetTokenInformation | 0x0 | 0x40901c | 0x9334 | 0x8134 | 0x15a |
SetTokenInformation | 0x0 | 0x409020 | 0x9338 | 0x8138 | 0x2c2 |
DuplicateTokenEx | 0x0 | 0x409024 | 0x933c | 0x813c | 0xdf |
RegQueryValueExA | 0x0 | 0x409028 | 0x9340 | 0x8140 | 0x26d |
RegOpenKeyExA | 0x0 | 0x40902c | 0x9344 | 0x8144 | 0x260 |
RegCloseKey | 0x0 | 0x409030 | 0x9348 | 0x8148 | 0x230 |
CryptImportKey | 0x0 | 0x409034 | 0x934c | 0x814c | 0xca |
CryptEncrypt | 0x0 | 0x409038 | 0x9350 | 0x8150 | 0xba |
SHELL32.dll (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
(by ordinal) | 0x2a8 | 0x409154 | 0x946c | 0x826c | - |
CommandLineToArgvW | 0x0 | 0x409158 | 0x9470 | 0x8270 | 0x6 |
ShellExecuteExW | 0x0 | 0x40915c | 0x9474 | 0x8274 | 0x121 |
SHGetPathFromIDListW | 0x0 | 0x409160 | 0x9478 | 0x8278 | 0xd7 |
SHBrowseForFolderW | 0x0 | 0x409164 | 0x947c | 0x827c | 0x7b |
SHGetSpecialFolderPathW | 0x0 | 0x409168 | 0x9480 | 0x8280 | 0xe1 |
ole32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CoInitialize | 0x0 | 0x4091d4 | 0x94ec | 0x82ec | 0x3e |
CoTaskMemFree | 0x0 | 0x4091d8 | 0x94f0 | 0x82f0 | 0x68 |
CoUninitialize | 0x0 | 0x4091dc | 0x94f4 | 0x82f4 | 0x6c |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
zes.exe | 1 | 0x00400000 | 0x00420FFF | Relevant Image |
![]() |
32-bit | 0x00402850 |
![]() |
![]() |
...
|
zes.exe | 1 | 0x00400000 | 0x00420FFF | Final Dump |
![]() |
32-bit | 0x00406E65 |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.Razy.599308 |
Malicious
|
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\explorer\thumbcache_32.db | Modified File | Stream |
Whitelisted
|
...
|
»
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\explorer\thumbcache_1024.db | Modified File | Stream |
Whitelisted
|
...
|
»
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\explorer\thumbcache_sr.db | Modified File | Stream |
Whitelisted
|
...
|
»
c:\windows\system32\winevt\logs\system.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\application.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\security.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\microsoft-windows-kernel-whea%4operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\microsoft-windows-grouppolicy%4operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\microsoft-windows-user profile service%4operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\microsoft-windows-offlinefiles%4operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\microsoft-windows-terminalservices-localsessionmanager%4operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\microsoft-windows-branchcachesmb%4operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\microsoft-windows-dhcpv6-client%4admin.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\explorer\thumbcache_96.db | Modified File | Stream |
Unknown
|
...
|
»
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\explorer\thumbcache_256.db | Modified File | Stream |
Unknown
|
...
|
»
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\explorer\thumbcache_idx.db | Modified File | Stream |
Unknown
|
...
|
»
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\explorer\explorerstartuplog_runonce.etl | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\0XH GEu.wav.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\5iwkI64gBz.mkv.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\ahtoY.flv.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\bsikVZ.jpg.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\BU7M mcTpJ93bZk.bmp.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\DqWuUGnY.avi.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\D_5K_QCaeZaqS1f_Oh_.avi.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\h9 vL1qAQ0j.mp3.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\j-fJcx.m4a.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\JTNWKHDQn2XuLRv.png.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\K8FlFC.pdf.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\l3CDAV63MRYTd8k.png.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\MkSA.m4a.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Ml-L2Mnu1hfDn3Ebw.png.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\NZt4WTx8.ots.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\o4Mezc2IK4f8C_fMJ.rtf.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\p6WJ6Sf_Bnqv.bmp.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\rcM75 cm.mkv.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\rFizuWFKJxS8V2i7l3.mkv.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\upgHuG7Awn9.mkv.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\uSOZ4TNyZhhaa Gl3.bmp.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\vvYk6R2xu.xlsx.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\W83hY-ueVY.wav.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Xgmd_gfDjhMfGMTGlo\ga 79jQ.csv.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Xgmd_gfDjhMfGMTGlo\qfzGN 6xma8CCH8IKS.wav.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Xgmd_gfDjhMfGMTGlo\sGnbgw8s2gTrD4\6R1trGA_1jq.wav.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Xgmd_gfDjhMfGMTGlo\sGnbgw8s2gTrD4\mGYbl5LMqWWKr.gif.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Xgmd_gfDjhMfGMTGlo\sGnbgw8s2gTrD4\NglnlXvJLQ haes0xIg.gif.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Xgmd_gfDjhMfGMTGlo\sGnbgw8s2gTrD4\ohRy5R3Zh\C OQSp3lrPEA6lKyBv.bmp.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Xgmd_gfDjhMfGMTGlo\sGnbgw8s2gTrD4\ohRy5R3Zh\O7GsOEI.swf.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Xgmd_gfDjhMfGMTGlo\sGnbgw8s2gTrD4\ohRy5R3Zh\Pef90osST9zF.mp4.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Xgmd_gfDjhMfGMTGlo\sGnbgw8s2gTrD4\ohRy5R3Zh\zeCGssAJsgRZgGpoHCS.swf.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Xgmd_gfDjhMfGMTGlo\sGnbgw8s2gTrD4\S0OmtXwErpHh0OJ.flv.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Xgmd_gfDjhMfGMTGlo\sGnbgw8s2gTrD4\YK9azGU-728BZMlu.mp4.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\ybEXHNZftujEdotm.mp4.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\zgyGh8GT0arDFn7.mkv.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\ZJyWQae78.bmp.[4B2E4630].[johncastle@msgsafe.io].zes | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Xgmd_gfDjhMfGMTGlo\readme-warning.txt | Dropped File | Text |
Unknown
|
...
|
»
c:\windows\serviceprofiles\localservice\appdata\local\lastalive0.dat | Dropped File | Stream |
Unknown
|
...
|
»
c:\windows\serviceprofiles\localservice\appdata\local\lastalive1.dat | Dropped File | Stream |
Unknown
|
...
|
»