VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Ransomware
Downloader
Trojan
|
Threat Names: |
Gen:Variant.Midie.69961
Trojan.GenericKD.31534187
Trojan.AgentWDCR.SVC
...
|
243E.TMP.EXE.DEL105265203.DEL105731312.exe
Windows Exe (x86-32)
Created at 2020-01-29T14:57:00
Remarks (2/3)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "10 minutes, 15 seconds" to "10 seconds" to reveal dormant functionality.
(0x0200003A): 2 tasks were rescheduled ahead of time to reveal dormant functionality.
Remarks
(0x0200001B): The maximum number of file reputation requests per analysis (150) was exceeded.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\243E.TMP.EXE.DEL105265203.DEL105731312.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2020-01-21 21:58 (UTC+1) |
Last Seen | 2020-01-27 22:19 (UTC+1) |
Names | Win32.Trojan.Kryptik |
Families | Kryptik |
Classification | Trojan |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x402161 |
Size Of Code | 0xd000 |
Size Of Initialized Data | 0xc7a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2019-05-26 01:01:17+00:00 |
Version Information (4)
»
FileVersion | 1.3.4 |
InternalName | sfsgvsdg.exe |
LegalCopyright | Copyright (C) 2019, fdbb |
ProductVersion | 1.3.6 |
Sections (11)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0xce84 | 0xd000 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.74 |
.rdata | 0x40e000 | 0x94732 | 0x94800 | 0xd400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 8.0 |
.data | 0x4a3000 | 0x159ac | 0x1800 | 0xa1c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.92 |
.wanaj | 0x4b9000 | 0x2800 | 0x2800 | 0xa3400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.tls | 0x4bc000 | 0x9 | 0x200 | 0xa5c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.wil | 0x4bd000 | 0x400 | 0x400 | 0xa5e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.yelas | 0x4be000 | 0x357 | 0x400 | 0xa6200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.zesih | 0x4bf000 | 0x15a | 0x200 | 0xa6600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.somozuy | 0x4c0000 | 0x157 | 0x200 | 0xa6800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rsrc | 0x4c1000 | 0x737d8 | 0x18800 | 0xa6a00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.81 |
.reloc | 0x535000 | 0x18ba | 0x1a00 | 0xbf200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 3.56 |
Imports (3)
»
KERNEL32.dll (94)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
HeapAlloc | 0x0 | 0x40e014 | 0xa1dc0 | 0xa11c0 | 0x29d |
SetConsoleTextAttribute | 0x0 | 0x40e018 | 0xa1dc4 | 0xa11c4 | 0x3c0 |
ConnectNamedPipe | 0x0 | 0x40e01c | 0xa1dc8 | 0xa11c8 | 0x56 |
GetPrivateProfileStringW | 0x0 | 0x40e020 | 0xa1dcc | 0xa11cc | 0x21d |
CreateIoCompletionPort | 0x0 | 0x40e024 | 0xa1dd0 | 0xa11d0 | 0x84 |
PurgeComm | 0x0 | 0x40e028 | 0xa1dd4 | 0xa11d4 | 0x349 |
EnumDateFormatsExW | 0x0 | 0x40e02c | 0xa1dd8 | 0xa11d8 | 0xe2 |
GetSystemWindowsDirectoryW | 0x0 | 0x40e030 | 0xa1ddc | 0xa11dc | 0x252 |
GetCurrentProcess | 0x0 | 0x40e034 | 0xa1de0 | 0xa11e0 | 0x1a9 |
LocalAlloc | 0x0 | 0x40e038 | 0xa1de4 | 0xa11e4 | 0x2f9 |
GetFullPathNameW | 0x0 | 0x40e03c | 0xa1de8 | 0xa11e8 | 0x1df |
GetWriteWatch | 0x0 | 0x40e040 | 0xa1dec | 0xa11ec | 0x282 |
GetProcAddress | 0x0 | 0x40e044 | 0xa1df0 | 0xa11f0 | 0x220 |
ClearCommError | 0x0 | 0x40e048 | 0xa1df4 | 0xa11f4 | 0x41 |
ReadConsoleA | 0x0 | 0x40e04c | 0xa1df8 | 0xa11f8 | 0x35c |
lstrcpyA | 0x0 | 0x40e050 | 0xa1dfc | 0xa11fc | 0x4af |
SetThreadExecutionState | 0x0 | 0x40e054 | 0xa1e00 | 0xa1200 | 0x407 |
GetDefaultCommConfigA | 0x0 | 0x40e058 | 0xa1e04 | 0xa1204 | 0x1b1 |
GetEnvironmentVariableW | 0x0 | 0x40e05c | 0xa1e08 | 0xa1208 | 0x1c3 |
BuildCommDCBAndTimeoutsA | 0x0 | 0x40e060 | 0xa1e0c | 0xa120c | 0x2c |
GetAtomNameW | 0x0 | 0x40e064 | 0xa1e10 | 0xa1210 | 0x156 |
ProcessIdToSessionId | 0x0 | 0x40e068 | 0xa1e14 | 0xa1214 | 0x347 |
FindNextVolumeW | 0x0 | 0x40e06c | 0xa1e18 | 0xa1218 | 0x135 |
GetLastError | 0x0 | 0x40e070 | 0xa1e1c | 0xa121c | 0x1e6 |
GetTickCount | 0x0 | 0x40e074 | 0xa1e20 | 0xa1220 | 0x266 |
lstrlenA | 0x0 | 0x40e078 | 0xa1e24 | 0xa1224 | 0x4b5 |
GetVolumeNameForVolumeMountPointW | 0x0 | 0x40e07c | 0xa1e28 | 0xa1228 | 0x27b |
MapViewOfFile | 0x0 | 0x40e080 | 0xa1e2c | 0xa122c | 0x30a |
LoadResource | 0x0 | 0x40e084 | 0xa1e30 | 0xa1230 | 0x2f6 |
LoadLibraryA | 0x0 | 0x40e088 | 0xa1e34 | 0xa1234 | 0x2f1 |
CompareStringA | 0x0 | 0x40e08c | 0xa1e38 | 0xa1238 | 0x52 |
CreateFileA | 0x0 | 0x40e090 | 0xa1e3c | 0xa123c | 0x78 |
GetCommandLineA | 0x0 | 0x40e094 | 0xa1e40 | 0xa1240 | 0x16f |
GetStartupInfoA | 0x0 | 0x40e098 | 0xa1e44 | 0xa1244 | 0x239 |
GetModuleHandleA | 0x0 | 0x40e09c | 0xa1e48 | 0xa1248 | 0x1f6 |
TerminateProcess | 0x0 | 0x40e0a0 | 0xa1e4c | 0xa124c | 0x42d |
UnhandledExceptionFilter | 0x0 | 0x40e0a4 | 0xa1e50 | 0xa1250 | 0x43e |
SetUnhandledExceptionFilter | 0x0 | 0x40e0a8 | 0xa1e54 | 0xa1254 | 0x415 |
IsDebuggerPresent | 0x0 | 0x40e0ac | 0xa1e58 | 0xa1258 | 0x2d1 |
SetHandleCount | 0x0 | 0x40e0b0 | 0xa1e5c | 0xa125c | 0x3e8 |
GetStdHandle | 0x0 | 0x40e0b4 | 0xa1e60 | 0xa1260 | 0x23b |
GetFileType | 0x0 | 0x40e0b8 | 0xa1e64 | 0xa1264 | 0x1d7 |
DeleteCriticalSection | 0x0 | 0x40e0bc | 0xa1e68 | 0xa1268 | 0xbe |
SetFilePointer | 0x0 | 0x40e0c0 | 0xa1e6c | 0xa126c | 0x3df |
EnterCriticalSection | 0x0 | 0x40e0c4 | 0xa1e70 | 0xa1270 | 0xd9 |
LeaveCriticalSection | 0x0 | 0x40e0c8 | 0xa1e74 | 0xa1274 | 0x2ef |
GetModuleHandleW | 0x0 | 0x40e0cc | 0xa1e78 | 0xa1278 | 0x1f9 |
Sleep | 0x0 | 0x40e0d0 | 0xa1e7c | 0xa127c | 0x421 |
ExitProcess | 0x0 | 0x40e0d4 | 0xa1e80 | 0xa1280 | 0x104 |
WriteFile | 0x0 | 0x40e0d8 | 0xa1e84 | 0xa1284 | 0x48d |
GetModuleFileNameA | 0x0 | 0x40e0dc | 0xa1e88 | 0xa1288 | 0x1f4 |
FreeEnvironmentStringsA | 0x0 | 0x40e0e0 | 0xa1e8c | 0xa128c | 0x14a |
GetEnvironmentStrings | 0x0 | 0x40e0e4 | 0xa1e90 | 0xa1290 | 0x1bf |
FreeEnvironmentStringsW | 0x0 | 0x40e0e8 | 0xa1e94 | 0xa1294 | 0x14b |
WideCharToMultiByte | 0x0 | 0x40e0ec | 0xa1e98 | 0xa1298 | 0x47a |
GetEnvironmentStringsW | 0x0 | 0x40e0f0 | 0xa1e9c | 0xa129c | 0x1c1 |
TlsGetValue | 0x0 | 0x40e0f4 | 0xa1ea0 | 0xa12a0 | 0x434 |
TlsAlloc | 0x0 | 0x40e0f8 | 0xa1ea4 | 0xa12a4 | 0x432 |
TlsSetValue | 0x0 | 0x40e0fc | 0xa1ea8 | 0xa12a8 | 0x435 |
TlsFree | 0x0 | 0x40e100 | 0xa1eac | 0xa12ac | 0x433 |
InterlockedIncrement | 0x0 | 0x40e104 | 0xa1eb0 | 0xa12b0 | 0x2c0 |
SetLastError | 0x0 | 0x40e108 | 0xa1eb4 | 0xa12b4 | 0x3ec |
GetCurrentThreadId | 0x0 | 0x40e10c | 0xa1eb8 | 0xa12b8 | 0x1ad |
InterlockedDecrement | 0x0 | 0x40e110 | 0xa1ebc | 0xa12bc | 0x2bc |
HeapCreate | 0x0 | 0x40e114 | 0xa1ec0 | 0xa12c0 | 0x29f |
VirtualFree | 0x0 | 0x40e118 | 0xa1ec4 | 0xa12c4 | 0x457 |
HeapFree | 0x0 | 0x40e11c | 0xa1ec8 | 0xa12c8 | 0x2a1 |
QueryPerformanceCounter | 0x0 | 0x40e120 | 0xa1ecc | 0xa12cc | 0x354 |
GetCurrentProcessId | 0x0 | 0x40e124 | 0xa1ed0 | 0xa12d0 | 0x1aa |
GetSystemTimeAsFileTime | 0x0 | 0x40e128 | 0xa1ed4 | 0xa12d4 | 0x24f |
GetCPInfo | 0x0 | 0x40e12c | 0xa1ed8 | 0xa12d8 | 0x15b |
GetACP | 0x0 | 0x40e130 | 0xa1edc | 0xa12dc | 0x152 |
GetOEMCP | 0x0 | 0x40e134 | 0xa1ee0 | 0xa12e0 | 0x213 |
IsValidCodePage | 0x0 | 0x40e138 | 0xa1ee4 | 0xa12e4 | 0x2db |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x40e13c | 0xa1ee8 | 0xa12e8 | 0x2b5 |
SetStdHandle | 0x0 | 0x40e140 | 0xa1eec | 0xa12ec | 0x3fc |
RtlUnwind | 0x0 | 0x40e144 | 0xa1ef0 | 0xa12f0 | 0x392 |
GetConsoleCP | 0x0 | 0x40e148 | 0xa1ef4 | 0xa12f4 | 0x183 |
GetConsoleMode | 0x0 | 0x40e14c | 0xa1ef8 | 0xa12f8 | 0x195 |
FlushFileBuffers | 0x0 | 0x40e150 | 0xa1efc | 0xa12fc | 0x141 |
VirtualAlloc | 0x0 | 0x40e154 | 0xa1f00 | 0xa1300 | 0x454 |
HeapReAlloc | 0x0 | 0x40e158 | 0xa1f04 | 0xa1304 | 0x2a4 |
RaiseException | 0x0 | 0x40e15c | 0xa1f08 | 0xa1308 | 0x35a |
LCMapStringA | 0x0 | 0x40e160 | 0xa1f0c | 0xa130c | 0x2e1 |
MultiByteToWideChar | 0x0 | 0x40e164 | 0xa1f10 | 0xa1310 | 0x31a |
LCMapStringW | 0x0 | 0x40e168 | 0xa1f14 | 0xa1314 | 0x2e3 |
GetStringTypeA | 0x0 | 0x40e16c | 0xa1f18 | 0xa1318 | 0x23d |
GetStringTypeW | 0x0 | 0x40e170 | 0xa1f1c | 0xa131c | 0x240 |
GetLocaleInfoA | 0x0 | 0x40e174 | 0xa1f20 | 0xa1320 | 0x1e8 |
WriteConsoleA | 0x0 | 0x40e178 | 0xa1f24 | 0xa1324 | 0x482 |
GetConsoleOutputCP | 0x0 | 0x40e17c | 0xa1f28 | 0xa1328 | 0x199 |
WriteConsoleW | 0x0 | 0x40e180 | 0xa1f2c | 0xa132c | 0x48c |
HeapSize | 0x0 | 0x40e184 | 0xa1f30 | 0xa1330 | 0x2a6 |
CloseHandle | 0x0 | 0x40e188 | 0xa1f34 | 0xa1334 | 0x43 |
ADVAPI32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
IsValidSid | 0x0 | 0x40e000 | 0xa1dac | 0xa11ac | 0x180 |
RegisterEventSourceW | 0x0 | 0x40e004 | 0xa1db0 | 0xa11b0 | 0x27d |
InitializeAcl | 0x0 | 0x40e008 | 0xa1db4 | 0xa11b4 | 0x170 |
EnumServicesStatusA | 0x0 | 0x40e00c | 0xa1db8 | 0xa11b8 | 0xfa |
MSIMG32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TransparentBlt | 0x0 | 0x40e190 | 0xa1f3c | 0xa133c | 0x3 |
Exports (2)
»
Api name | EAT Address | Ordinal |
---|---|---|
@dfkvodv@0 | 0x1010 | 0x1 |
@mctraxer@0 | 0x1000 | 0x2 |
Memory Dumps (51)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Relevant Image |
![]() |
32-bit | 0x00401FE3 |
![]() |
![]() |
...
|
buffer | 1 | 0x00540000 | 0x005D0FFF | First Execution |
![]() |
32-bit | 0x00540020 |
![]() |
![]() |
...
|
buffer | 1 | 0x01D70000 | 0x01E89FFF | First Execution |
![]() |
32-bit | 0x01D70000 |
![]() |
![]() |
...
|
buffer | 1 | 0x01D70000 | 0x01E89FFF | Content Changed |
![]() |
32-bit | 0x01D704F6 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x00424141 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x00423F84 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0042C0F0 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0043B021 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0042D8D0 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x00421881 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0042B420 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x004548D0 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0041CC50 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x00419E70 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0040CF10 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0042B420 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Final Dump |
![]() |
32-bit | 0x00430BF0 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x00433F99 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0041A6DF |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0041D0B0 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0043233F |
![]() |
![]() |
...
|
buffer | 1 | 0x01D70000 | 0x01E89FFF | Content Changed |
![]() |
32-bit | 0x01D70920 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 1 | 0x00400000 | 0x00536FFF | Process Termination |
![]() |
32-bit | - |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Relevant Image |
![]() |
32-bit | 0x00401FE3 |
![]() |
![]() |
...
|
buffer | 5 | 0x00310000 | 0x003A0FFF | First Execution |
![]() |
32-bit | 0x00310020 |
![]() |
![]() |
...
|
buffer | 5 | 0x01E70000 | 0x01F89FFF | First Execution |
![]() |
32-bit | 0x01E70000 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x00424141 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x00423F84 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0042C0F0 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0043B021 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0042D8D0 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x00421881 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0042B420 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x004548D0 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0041CC50 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x00419E70 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0040CF10 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0041B680 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0041E031 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0042E003 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x00447F50 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0041E95A |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x00420E92 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x004264EF |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x00423A38 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x00430BBF |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0041F01A |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0040EF50 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0042E003 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0041D3C0 |
![]() |
![]() |
...
|
243e.tmp.exe.del105265203.del105731312.exe | 5 | 0x00400000 | 0x00536FFF | Content Changed |
![]() |
32-bit | 0x0041E081 |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.Midie.69961 |
Malicious
|
C:\Windows\System32\drivers\etc\hosts | Modified File | Text |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2018-11-13 17:14 (UTC+1) |
Last Seen | 2019-06-09 17:16 (UTC+2) |
Names | Script-BAT.Trojan.Qhost |
Families | Qhost |
Classification | Trojan |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Trojan.Qhost.1 |
Malicious
|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\v3m_7Lp.pdf | Modified File |
Malicious
|
...
|
»
YARA Matches (3)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
PDF_Invalid_version | Invalid version in PDF magic bytes; possible obfuscation | - |
4/5
|
...
|
PDF_Missing_startxref | Malformed PDF without startxref; possible obfuscation | - |
3/5
|
...
|
PDF_Missing_EOF | Malformed PDF without EOF marker; possible obfuscation | - |
3/5
|
...
|
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\G9jMVN8XZJi.pdf.kodc | Dropped File |
Malicious
|
...
|
»
YARA Matches (3)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
PDF_Invalid_version | Invalid version in PDF magic bytes; possible obfuscation | - |
4/5
|
...
|
PDF_Missing_startxref | Malformed PDF without startxref; possible obfuscation | - |
3/5
|
...
|
PDF_Missing_EOF | Malformed PDF without EOF marker; possible obfuscation | - |
3/5
|
...
|
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\cc96d4d5-77d7-41f6-9d0f-85ea800861b4\updatewin1.exe | Downloaded File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2019-01-16 22:21 (UTC+1) |
Last Seen | 2020-01-08 11:41 (UTC+1) |
Names | Win32.Trojan.Wlt |
Families | Wlt |
Classification | Trojan |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x402d76 |
Size Of Code | 0x1c200 |
Size Of Initialized Data | 0x2c200 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2017-07-24 12:23:54+00:00 |
Version Information (3)
»
FileVersion | 7.7.7.18 |
InternalName | rawudiyeh.exe |
LegalCopyright | Copyright (C) 2018, sacuwedimufoy |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x1c07e | 0x1c200 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.62 |
.rdata | 0x41e000 | 0x463e | 0x4800 | 0x1c600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.26 |
.data | 0x423000 | 0x1c6a8 | 0x17400 | 0x20e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.83 |
.rsrc | 0x440000 | 0xa578 | 0xa600 | 0x38200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.88 |
.reloc | 0x44b000 | 0x1968 | 0x1a00 | 0x42800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.34 |
Imports (4)
»
KERNEL32.dll (102)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ExitThread | 0x0 | 0x41e028 | 0x21afc | 0x200fc | 0x105 |
GetStartupInfoW | 0x0 | 0x41e02c | 0x21b00 | 0x20100 | 0x23a |
GetLastError | 0x0 | 0x41e030 | 0x21b04 | 0x20104 | 0x1e6 |
GetProcAddress | 0x0 | 0x41e034 | 0x21b08 | 0x20108 | 0x220 |
CreateJobSet | 0x0 | 0x41e038 | 0x21b0c | 0x2010c | 0x87 |
GlobalFree | 0x0 | 0x41e03c | 0x21b10 | 0x20110 | 0x28c |
LoadLibraryA | 0x0 | 0x41e040 | 0x21b14 | 0x20114 | 0x2f1 |
OpenWaitableTimerW | 0x0 | 0x41e044 | 0x21b18 | 0x20118 | 0x339 |
AddAtomA | 0x0 | 0x41e048 | 0x21b1c | 0x2011c | 0x3 |
FindFirstChangeNotificationA | 0x0 | 0x41e04c | 0x21b20 | 0x20120 | 0x11b |
VirtualProtect | 0x0 | 0x41e050 | 0x21b24 | 0x20124 | 0x45a |
GetCurrentDirectoryA | 0x0 | 0x41e054 | 0x21b28 | 0x20128 | 0x1a7 |
GetACP | 0x0 | 0x41e058 | 0x21b2c | 0x2012c | 0x152 |
InterlockedPushEntrySList | 0x0 | 0x41e05c | 0x21b30 | 0x20130 | 0x2c2 |
CompareStringW | 0x0 | 0x41e060 | 0x21b34 | 0x20134 | 0x55 |
CompareStringA | 0x0 | 0x41e064 | 0x21b38 | 0x20138 | 0x52 |
CreateFileA | 0x0 | 0x41e068 | 0x21b3c | 0x2013c | 0x78 |
GetTimeZoneInformation | 0x0 | 0x41e06c | 0x21b40 | 0x20140 | 0x26b |
WriteConsoleW | 0x0 | 0x41e070 | 0x21b44 | 0x20144 | 0x48c |
GetConsoleOutputCP | 0x0 | 0x41e074 | 0x21b48 | 0x20148 | 0x199 |
WriteConsoleA | 0x0 | 0x41e078 | 0x21b4c | 0x2014c | 0x482 |
CloseHandle | 0x0 | 0x41e07c | 0x21b50 | 0x20150 | 0x43 |
IsValidLocale | 0x0 | 0x41e080 | 0x21b54 | 0x20154 | 0x2dd |
EnumSystemLocalesA | 0x0 | 0x41e084 | 0x21b58 | 0x20158 | 0xf8 |
GetUserDefaultLCID | 0x0 | 0x41e088 | 0x21b5c | 0x2015c | 0x26d |
GetSystemTimeAdjustment | 0x0 | 0x41e08c | 0x21b60 | 0x20160 | 0x24e |
GetSystemTimes | 0x0 | 0x41e090 | 0x21b64 | 0x20164 | 0x250 |
GetTickCount | 0x0 | 0x41e094 | 0x21b68 | 0x20168 | 0x266 |
FreeEnvironmentStringsA | 0x0 | 0x41e098 | 0x21b6c | 0x2016c | 0x14a |
GetComputerNameW | 0x0 | 0x41e09c | 0x21b70 | 0x20170 | 0x178 |
FindCloseChangeNotification | 0x0 | 0x41e0a0 | 0x21b74 | 0x20174 | 0x11a |
FindResourceExW | 0x0 | 0x41e0a4 | 0x21b78 | 0x20178 | 0x138 |
GetCPInfo | 0x0 | 0x41e0a8 | 0x21b7c | 0x2017c | 0x15b |
SetProcessShutdownParameters | 0x0 | 0x41e0ac | 0x21b80 | 0x20180 | 0x3f9 |
GetModuleHandleExA | 0x0 | 0x41e0b0 | 0x21b84 | 0x20184 | 0x1f7 |
GetDateFormatA | 0x0 | 0x41e0b4 | 0x21b88 | 0x20188 | 0x1ae |
GetTimeFormatA | 0x0 | 0x41e0b8 | 0x21b8c | 0x2018c | 0x268 |
GetStringTypeW | 0x0 | 0x41e0bc | 0x21b90 | 0x20190 | 0x240 |
GetStringTypeA | 0x0 | 0x41e0c0 | 0x21b94 | 0x20194 | 0x23d |
LCMapStringW | 0x0 | 0x41e0c4 | 0x21b98 | 0x20198 | 0x2e3 |
GetCommandLineA | 0x0 | 0x41e0c8 | 0x21b9c | 0x2019c | 0x16f |
GetStartupInfoA | 0x0 | 0x41e0cc | 0x21ba0 | 0x201a0 | 0x239 |
RaiseException | 0x0 | 0x41e0d0 | 0x21ba4 | 0x201a4 | 0x35a |
RtlUnwind | 0x0 | 0x41e0d4 | 0x21ba8 | 0x201a8 | 0x392 |
TerminateProcess | 0x0 | 0x41e0d8 | 0x21bac | 0x201ac | 0x42d |
GetCurrentProcess | 0x0 | 0x41e0dc | 0x21bb0 | 0x201b0 | 0x1a9 |
UnhandledExceptionFilter | 0x0 | 0x41e0e0 | 0x21bb4 | 0x201b4 | 0x43e |
SetUnhandledExceptionFilter | 0x0 | 0x41e0e4 | 0x21bb8 | 0x201b8 | 0x415 |
IsDebuggerPresent | 0x0 | 0x41e0e8 | 0x21bbc | 0x201bc | 0x2d1 |
HeapAlloc | 0x0 | 0x41e0ec | 0x21bc0 | 0x201c0 | 0x29d |
HeapFree | 0x0 | 0x41e0f0 | 0x21bc4 | 0x201c4 | 0x2a1 |
EnterCriticalSection | 0x0 | 0x41e0f4 | 0x21bc8 | 0x201c8 | 0xd9 |
LeaveCriticalSection | 0x0 | 0x41e0f8 | 0x21bcc | 0x201cc | 0x2ef |
SetHandleCount | 0x0 | 0x41e0fc | 0x21bd0 | 0x201d0 | 0x3e8 |
GetStdHandle | 0x0 | 0x41e100 | 0x21bd4 | 0x201d4 | 0x23b |
GetFileType | 0x0 | 0x41e104 | 0x21bd8 | 0x201d8 | 0x1d7 |
DeleteCriticalSection | 0x0 | 0x41e108 | 0x21bdc | 0x201dc | 0xbe |
GetModuleHandleW | 0x0 | 0x41e10c | 0x21be0 | 0x201e0 | 0x1f9 |
Sleep | 0x0 | 0x41e110 | 0x21be4 | 0x201e4 | 0x421 |
ExitProcess | 0x0 | 0x41e114 | 0x21be8 | 0x201e8 | 0x104 |
WriteFile | 0x0 | 0x41e118 | 0x21bec | 0x201ec | 0x48d |
GetModuleFileNameA | 0x0 | 0x41e11c | 0x21bf0 | 0x201f0 | 0x1f4 |
GetEnvironmentStrings | 0x0 | 0x41e120 | 0x21bf4 | 0x201f4 | 0x1bf |
FreeEnvironmentStringsW | 0x0 | 0x41e124 | 0x21bf8 | 0x201f8 | 0x14b |
WideCharToMultiByte | 0x0 | 0x41e128 | 0x21bfc | 0x201fc | 0x47a |
GetEnvironmentStringsW | 0x0 | 0x41e12c | 0x21c00 | 0x20200 | 0x1c1 |
TlsGetValue | 0x0 | 0x41e130 | 0x21c04 | 0x20204 | 0x434 |
TlsAlloc | 0x0 | 0x41e134 | 0x21c08 | 0x20208 | 0x432 |
TlsSetValue | 0x0 | 0x41e138 | 0x21c0c | 0x2020c | 0x435 |
TlsFree | 0x0 | 0x41e13c | 0x21c10 | 0x20210 | 0x433 |
InterlockedIncrement | 0x0 | 0x41e140 | 0x21c14 | 0x20214 | 0x2c0 |
SetLastError | 0x0 | 0x41e144 | 0x21c18 | 0x20218 | 0x3ec |
GetCurrentThreadId | 0x0 | 0x41e148 | 0x21c1c | 0x2021c | 0x1ad |
InterlockedDecrement | 0x0 | 0x41e14c | 0x21c20 | 0x20220 | 0x2bc |
GetCurrentThread | 0x0 | 0x41e150 | 0x21c24 | 0x20224 | 0x1ac |
HeapCreate | 0x0 | 0x41e154 | 0x21c28 | 0x20228 | 0x29f |
HeapDestroy | 0x0 | 0x41e158 | 0x21c2c | 0x2022c | 0x2a0 |
VirtualFree | 0x0 | 0x41e15c | 0x21c30 | 0x20230 | 0x457 |
QueryPerformanceCounter | 0x0 | 0x41e160 | 0x21c34 | 0x20234 | 0x354 |
GetCurrentProcessId | 0x0 | 0x41e164 | 0x21c38 | 0x20238 | 0x1aa |
GetSystemTimeAsFileTime | 0x0 | 0x41e168 | 0x21c3c | 0x2023c | 0x24f |
FatalAppExitA | 0x0 | 0x41e16c | 0x21c40 | 0x20240 | 0x10b |
VirtualAlloc | 0x0 | 0x41e170 | 0x21c44 | 0x20244 | 0x454 |
HeapReAlloc | 0x0 | 0x41e174 | 0x21c48 | 0x20248 | 0x2a4 |
MultiByteToWideChar | 0x0 | 0x41e178 | 0x21c4c | 0x2024c | 0x31a |
ReadFile | 0x0 | 0x41e17c | 0x21c50 | 0x20250 | 0x368 |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x41e180 | 0x21c54 | 0x20254 | 0x2b5 |
HeapSize | 0x0 | 0x41e184 | 0x21c58 | 0x20258 | 0x2a6 |
SetConsoleCtrlHandler | 0x0 | 0x41e188 | 0x21c5c | 0x2025c | 0x3a7 |
FreeLibrary | 0x0 | 0x41e18c | 0x21c60 | 0x20260 | 0x14c |
InterlockedExchange | 0x0 | 0x41e190 | 0x21c64 | 0x20264 | 0x2bd |
GetOEMCP | 0x0 | 0x41e194 | 0x21c68 | 0x20268 | 0x213 |
IsValidCodePage | 0x0 | 0x41e198 | 0x21c6c | 0x2026c | 0x2db |
GetConsoleCP | 0x0 | 0x41e19c | 0x21c70 | 0x20270 | 0x183 |
GetConsoleMode | 0x0 | 0x41e1a0 | 0x21c74 | 0x20274 | 0x195 |
FlushFileBuffers | 0x0 | 0x41e1a4 | 0x21c78 | 0x20278 | 0x141 |
SetFilePointer | 0x0 | 0x41e1a8 | 0x21c7c | 0x2027c | 0x3df |
SetStdHandle | 0x0 | 0x41e1ac | 0x21c80 | 0x20280 | 0x3fc |
GetLocaleInfoW | 0x0 | 0x41e1b0 | 0x21c84 | 0x20284 | 0x1ea |
GetLocaleInfoA | 0x0 | 0x41e1b4 | 0x21c88 | 0x20288 | 0x1e8 |
LCMapStringA | 0x0 | 0x41e1b8 | 0x21c8c | 0x2028c | 0x2e1 |
SetEnvironmentVariableA | 0x0 | 0x41e1bc | 0x21c90 | 0x20290 | 0x3d0 |
USER32.dll (10)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CloseClipboard | 0x0 | 0x41e1d8 | 0x21cac | 0x202ac | 0x47 |
BeginPaint | 0x0 | 0x41e1dc | 0x21cb0 | 0x202b0 | 0xe |
CallMsgFilterW | 0x0 | 0x41e1e0 | 0x21cb4 | 0x202b4 | 0x1a |
PeekMessageA | 0x0 | 0x41e1e4 | 0x21cb8 | 0x202b8 | 0x21b |
MapVirtualKeyExW | 0x0 | 0x41e1e8 | 0x21cbc | 0x202bc | 0x1f1 |
RegisterRawInputDevices | 0x0 | 0x41e1ec | 0x21cc0 | 0x202c0 | 0x242 |
GetClipboardSequenceNumber | 0x0 | 0x41e1f0 | 0x21cc4 | 0x202c4 | 0x113 |
CountClipboardFormats | 0x0 | 0x41e1f4 | 0x21cc8 | 0x202c8 | 0x50 |
GetDialogBaseUnits | 0x0 | 0x41e1f8 | 0x21ccc | 0x202cc | 0x11d |
GetClassLongW | 0x0 | 0x41e1fc | 0x21cd0 | 0x202d0 | 0x109 |
GDI32.dll (9)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
PolyTextOutW | 0x0 | 0x41e000 | 0x21ad4 | 0x200d4 | 0x23c |
CreateCompatibleDC | 0x0 | 0x41e004 | 0x21ad8 | 0x200d8 | 0x2e |
Rectangle | 0x0 | 0x41e008 | 0x21adc | 0x200dc | 0x246 |
SetStretchBltMode | 0x0 | 0x41e00c | 0x21ae0 | 0x200e0 | 0x289 |
SetPixelV | 0x0 | 0x41e010 | 0x21ae4 | 0x200e4 | 0x284 |
GetClipBox | 0x0 | 0x41e014 | 0x21ae8 | 0x200e8 | 0x1aa |
CreateDiscardableBitmap | 0x0 | 0x41e018 | 0x21aec | 0x200ec | 0x35 |
StrokeAndFillPath | 0x0 | 0x41e01c | 0x21af0 | 0x200f0 | 0x29c |
GetBitmapBits | 0x0 | 0x41e020 | 0x21af4 | 0x200f4 | 0x191 |
SHELL32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteW | 0x0 | 0x41e1c4 | 0x21c98 | 0x20298 | 0x118 |
ShellAboutW | 0x0 | 0x41e1c8 | 0x21c9c | 0x2029c | 0x110 |
DuplicateIcon | 0x0 | 0x41e1cc | 0x21ca0 | 0x202a0 | 0x23 |
DragQueryFileA | 0x0 | 0x41e1d0 | 0x21ca4 | 0x202a4 | 0x1e |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Trojan.GenericKD.31534187 |
Malicious
|
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\cc96d4d5-77d7-41f6-9d0f-85ea800861b4\updatewin2.exe | Downloaded File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2019-01-16 22:21 (UTC+1) |
Last Seen | 2020-01-28 16:56 (UTC+1) |
Names | Win32.Trojan.Wlt |
Families | Wlt |
Classification | Trojan |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x402d64 |
Size Of Code | 0x1c200 |
Size Of Initialized Data | 0x2c800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2017-11-21 06:08:45+00:00 |
Version Information (3)
»
FileVersion | 5.3.7.82 |
InternalName | gigifaw.exe |
LegalCopyright | Copyright (C) 2018, guvaxiz |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x1c03e | 0x1c200 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.62 |
.rdata | 0x41e000 | 0x45ec | 0x4600 | 0x1c600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.34 |
.data | 0x423000 | 0x1cde8 | 0x17c00 | 0x20c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.8 |
.rsrc | 0x440000 | 0xa724 | 0xa800 | 0x38800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.88 |
.reloc | 0x44b000 | 0x195c | 0x1a00 | 0x43000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.33 |
Imports (4)
»
KERNEL32.dll (98)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ExitThread | 0x0 | 0x41e024 | 0x21ae8 | 0x200e8 | 0x105 |
GetStartupInfoW | 0x0 | 0x41e028 | 0x21aec | 0x200ec | 0x23a |
GetLastError | 0x0 | 0x41e02c | 0x21af0 | 0x200f0 | 0x1e6 |
GetProcAddress | 0x0 | 0x41e030 | 0x21af4 | 0x200f4 | 0x220 |
GlobalFree | 0x0 | 0x41e034 | 0x21af8 | 0x200f8 | 0x28c |
LoadLibraryA | 0x0 | 0x41e038 | 0x21afc | 0x200fc | 0x2f1 |
AddAtomA | 0x0 | 0x41e03c | 0x21b00 | 0x20100 | 0x3 |
FindFirstChangeNotificationA | 0x0 | 0x41e040 | 0x21b04 | 0x20104 | 0x11b |
VirtualProtect | 0x0 | 0x41e044 | 0x21b08 | 0x20108 | 0x45a |
GetCurrentDirectoryA | 0x0 | 0x41e048 | 0x21b0c | 0x2010c | 0x1a7 |
SetProcessShutdownParameters | 0x0 | 0x41e04c | 0x21b10 | 0x20110 | 0x3f9 |
GetACP | 0x0 | 0x41e050 | 0x21b14 | 0x20114 | 0x152 |
CompareStringA | 0x0 | 0x41e054 | 0x21b18 | 0x20118 | 0x52 |
CreateFileA | 0x0 | 0x41e058 | 0x21b1c | 0x2011c | 0x78 |
GetTimeZoneInformation | 0x0 | 0x41e05c | 0x21b20 | 0x20120 | 0x26b |
WriteConsoleW | 0x0 | 0x41e060 | 0x21b24 | 0x20124 | 0x48c |
GetConsoleOutputCP | 0x0 | 0x41e064 | 0x21b28 | 0x20128 | 0x199 |
WriteConsoleA | 0x0 | 0x41e068 | 0x21b2c | 0x2012c | 0x482 |
CloseHandle | 0x0 | 0x41e06c | 0x21b30 | 0x20130 | 0x43 |
IsValidLocale | 0x0 | 0x41e070 | 0x21b34 | 0x20134 | 0x2dd |
EnumSystemLocalesA | 0x0 | 0x41e074 | 0x21b38 | 0x20138 | 0xf8 |
GetUserDefaultLCID | 0x0 | 0x41e078 | 0x21b3c | 0x2013c | 0x26d |
GetDateFormatA | 0x0 | 0x41e07c | 0x21b40 | 0x20140 | 0x1ae |
GetTimeFormatA | 0x0 | 0x41e080 | 0x21b44 | 0x20144 | 0x268 |
InitAtomTable | 0x0 | 0x41e084 | 0x21b48 | 0x20148 | 0x2ae |
GetSystemTimes | 0x0 | 0x41e088 | 0x21b4c | 0x2014c | 0x250 |
GetTickCount | 0x0 | 0x41e08c | 0x21b50 | 0x20150 | 0x266 |
FreeEnvironmentStringsA | 0x0 | 0x41e090 | 0x21b54 | 0x20154 | 0x14a |
GetComputerNameW | 0x0 | 0x41e094 | 0x21b58 | 0x20158 | 0x178 |
FindCloseChangeNotification | 0x0 | 0x41e098 | 0x21b5c | 0x2015c | 0x11a |
FindResourceExW | 0x0 | 0x41e09c | 0x21b60 | 0x20160 | 0x138 |
CompareStringW | 0x0 | 0x41e0a0 | 0x21b64 | 0x20164 | 0x55 |
GetCPInfo | 0x0 | 0x41e0a4 | 0x21b68 | 0x20168 | 0x15b |
GetStringTypeW | 0x0 | 0x41e0a8 | 0x21b6c | 0x2016c | 0x240 |
GetStringTypeA | 0x0 | 0x41e0ac | 0x21b70 | 0x20170 | 0x23d |
LCMapStringW | 0x0 | 0x41e0b0 | 0x21b74 | 0x20174 | 0x2e3 |
LCMapStringA | 0x0 | 0x41e0b4 | 0x21b78 | 0x20178 | 0x2e1 |
GetLocaleInfoA | 0x0 | 0x41e0b8 | 0x21b7c | 0x2017c | 0x1e8 |
GetCommandLineA | 0x0 | 0x41e0bc | 0x21b80 | 0x20180 | 0x16f |
GetStartupInfoA | 0x0 | 0x41e0c0 | 0x21b84 | 0x20184 | 0x239 |
RaiseException | 0x0 | 0x41e0c4 | 0x21b88 | 0x20188 | 0x35a |
RtlUnwind | 0x0 | 0x41e0c8 | 0x21b8c | 0x2018c | 0x392 |
TerminateProcess | 0x0 | 0x41e0cc | 0x21b90 | 0x20190 | 0x42d |
GetCurrentProcess | 0x0 | 0x41e0d0 | 0x21b94 | 0x20194 | 0x1a9 |
UnhandledExceptionFilter | 0x0 | 0x41e0d4 | 0x21b98 | 0x20198 | 0x43e |
SetUnhandledExceptionFilter | 0x0 | 0x41e0d8 | 0x21b9c | 0x2019c | 0x415 |
IsDebuggerPresent | 0x0 | 0x41e0dc | 0x21ba0 | 0x201a0 | 0x2d1 |
HeapAlloc | 0x0 | 0x41e0e0 | 0x21ba4 | 0x201a4 | 0x29d |
HeapFree | 0x0 | 0x41e0e4 | 0x21ba8 | 0x201a8 | 0x2a1 |
EnterCriticalSection | 0x0 | 0x41e0e8 | 0x21bac | 0x201ac | 0xd9 |
LeaveCriticalSection | 0x0 | 0x41e0ec | 0x21bb0 | 0x201b0 | 0x2ef |
SetHandleCount | 0x0 | 0x41e0f0 | 0x21bb4 | 0x201b4 | 0x3e8 |
GetStdHandle | 0x0 | 0x41e0f4 | 0x21bb8 | 0x201b8 | 0x23b |
GetFileType | 0x0 | 0x41e0f8 | 0x21bbc | 0x201bc | 0x1d7 |
DeleteCriticalSection | 0x0 | 0x41e0fc | 0x21bc0 | 0x201c0 | 0xbe |
GetModuleHandleW | 0x0 | 0x41e100 | 0x21bc4 | 0x201c4 | 0x1f9 |
Sleep | 0x0 | 0x41e104 | 0x21bc8 | 0x201c8 | 0x421 |
ExitProcess | 0x0 | 0x41e108 | 0x21bcc | 0x201cc | 0x104 |
WriteFile | 0x0 | 0x41e10c | 0x21bd0 | 0x201d0 | 0x48d |
GetModuleFileNameA | 0x0 | 0x41e110 | 0x21bd4 | 0x201d4 | 0x1f4 |
GetEnvironmentStrings | 0x0 | 0x41e114 | 0x21bd8 | 0x201d8 | 0x1bf |
FreeEnvironmentStringsW | 0x0 | 0x41e118 | 0x21bdc | 0x201dc | 0x14b |
WideCharToMultiByte | 0x0 | 0x41e11c | 0x21be0 | 0x201e0 | 0x47a |
GetEnvironmentStringsW | 0x0 | 0x41e120 | 0x21be4 | 0x201e4 | 0x1c1 |
TlsGetValue | 0x0 | 0x41e124 | 0x21be8 | 0x201e8 | 0x434 |
TlsAlloc | 0x0 | 0x41e128 | 0x21bec | 0x201ec | 0x432 |
TlsSetValue | 0x0 | 0x41e12c | 0x21bf0 | 0x201f0 | 0x435 |
TlsFree | 0x0 | 0x41e130 | 0x21bf4 | 0x201f4 | 0x433 |
InterlockedIncrement | 0x0 | 0x41e134 | 0x21bf8 | 0x201f8 | 0x2c0 |
SetLastError | 0x0 | 0x41e138 | 0x21bfc | 0x201fc | 0x3ec |
GetCurrentThreadId | 0x0 | 0x41e13c | 0x21c00 | 0x20200 | 0x1ad |
InterlockedDecrement | 0x0 | 0x41e140 | 0x21c04 | 0x20204 | 0x2bc |
GetCurrentThread | 0x0 | 0x41e144 | 0x21c08 | 0x20208 | 0x1ac |
HeapCreate | 0x0 | 0x41e148 | 0x21c0c | 0x2020c | 0x29f |
HeapDestroy | 0x0 | 0x41e14c | 0x21c10 | 0x20210 | 0x2a0 |
VirtualFree | 0x0 | 0x41e150 | 0x21c14 | 0x20214 | 0x457 |
QueryPerformanceCounter | 0x0 | 0x41e154 | 0x21c18 | 0x20218 | 0x354 |
GetCurrentProcessId | 0x0 | 0x41e158 | 0x21c1c | 0x2021c | 0x1aa |
GetSystemTimeAsFileTime | 0x0 | 0x41e15c | 0x21c20 | 0x20220 | 0x24f |
FatalAppExitA | 0x0 | 0x41e160 | 0x21c24 | 0x20224 | 0x10b |
VirtualAlloc | 0x0 | 0x41e164 | 0x21c28 | 0x20228 | 0x454 |
HeapReAlloc | 0x0 | 0x41e168 | 0x21c2c | 0x2022c | 0x2a4 |
MultiByteToWideChar | 0x0 | 0x41e16c | 0x21c30 | 0x20230 | 0x31a |
ReadFile | 0x0 | 0x41e170 | 0x21c34 | 0x20234 | 0x368 |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x41e174 | 0x21c38 | 0x20238 | 0x2b5 |
HeapSize | 0x0 | 0x41e178 | 0x21c3c | 0x2023c | 0x2a6 |
SetConsoleCtrlHandler | 0x0 | 0x41e17c | 0x21c40 | 0x20240 | 0x3a7 |
FreeLibrary | 0x0 | 0x41e180 | 0x21c44 | 0x20244 | 0x14c |
InterlockedExchange | 0x0 | 0x41e184 | 0x21c48 | 0x20248 | 0x2bd |
GetOEMCP | 0x0 | 0x41e188 | 0x21c4c | 0x2024c | 0x213 |
IsValidCodePage | 0x0 | 0x41e18c | 0x21c50 | 0x20250 | 0x2db |
GetConsoleCP | 0x0 | 0x41e190 | 0x21c54 | 0x20254 | 0x183 |
GetConsoleMode | 0x0 | 0x41e194 | 0x21c58 | 0x20258 | 0x195 |
FlushFileBuffers | 0x0 | 0x41e198 | 0x21c5c | 0x2025c | 0x141 |
SetFilePointer | 0x0 | 0x41e19c | 0x21c60 | 0x20260 | 0x3df |
SetStdHandle | 0x0 | 0x41e1a0 | 0x21c64 | 0x20264 | 0x3fc |
GetLocaleInfoW | 0x0 | 0x41e1a4 | 0x21c68 | 0x20268 | 0x1ea |
SetEnvironmentVariableA | 0x0 | 0x41e1a8 | 0x21c6c | 0x2026c | 0x3d0 |
USER32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CloseClipboard | 0x0 | 0x41e1c4 | 0x21c88 | 0x20288 | 0x47 |
GetSubMenu | 0x0 | 0x41e1c8 | 0x21c8c | 0x2028c | 0x16b |
LoadBitmapA | 0x0 | 0x41e1cc | 0x21c90 | 0x20290 | 0x1d0 |
BeginPaint | 0x0 | 0x41e1d0 | 0x21c94 | 0x20294 | 0xe |
CallMsgFilterW | 0x0 | 0x41e1d4 | 0x21c98 | 0x20298 | 0x1a |
PeekMessageA | 0x0 | 0x41e1d8 | 0x21c9c | 0x2029c | 0x21b |
MapVirtualKeyExW | 0x0 | 0x41e1dc | 0x21ca0 | 0x202a0 | 0x1f1 |
RegisterRawInputDevices | 0x0 | 0x41e1e0 | 0x21ca4 | 0x202a4 | 0x242 |
SetWindowsHookExW | 0x0 | 0x41e1e4 | 0x21ca8 | 0x202a8 | 0x2b0 |
GetClipboardSequenceNumber | 0x0 | 0x41e1e8 | 0x21cac | 0x202ac | 0x113 |
GetDialogBaseUnits | 0x0 | 0x41e1ec | 0x21cb0 | 0x202b0 | 0x11d |
MessageBoxIndirectA | 0x0 | 0x41e1f0 | 0x21cb4 | 0x202b4 | 0x1fb |
GDI32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CreateCompatibleDC | 0x0 | 0x41e000 | 0x21ac4 | 0x200c4 | 0x2e |
PlayEnhMetaFile | 0x0 | 0x41e004 | 0x21ac8 | 0x200c8 | 0x230 |
ScaleViewportExtEx | 0x0 | 0x41e008 | 0x21acc | 0x200cc | 0x258 |
SetStretchBltMode | 0x0 | 0x41e00c | 0x21ad0 | 0x200d0 | 0x289 |
SetPixelV | 0x0 | 0x41e010 | 0x21ad4 | 0x200d4 | 0x284 |
CreateDiscardableBitmap | 0x0 | 0x41e014 | 0x21ad8 | 0x200d8 | 0x35 |
AddFontResourceW | 0x0 | 0x41e018 | 0x21adc | 0x200dc | 0x7 |
SetDeviceGammaRamp | 0x0 | 0x41e01c | 0x21ae0 | 0x200e0 | 0x271 |
SHELL32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ExtractAssociatedIconA | 0x0 | 0x41e1b0 | 0x21c74 | 0x20274 | 0x24 |
ShellExecuteW | 0x0 | 0x41e1b4 | 0x21c78 | 0x20278 | 0x118 |
ShellAboutW | 0x0 | 0x41e1b8 | 0x21c7c | 0x2027c | 0x110 |
DragQueryFileA | 0x0 | 0x41e1bc | 0x21c80 | 0x20280 | 0x1e |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Trojan.AgentWDCR.SVC |
Malicious
|
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\cc96d4d5-77d7-41f6-9d0f-85ea800861b4\updatewin.exe | Downloaded File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2019-01-16 22:21 (UTC+1) |
Last Seen | 2020-01-15 01:22 (UTC+1) |
Names | Win32.Trojan.Fareit |
Families | Fareit |
Classification | Trojan |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x402d7c |
Size Of Code | 0x1c200 |
Size Of Initialized Data | 0x2d400 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2018-02-19 08:26:47+00:00 |
Version Information (3)
»
FileVersion | 8.8.10.11 |
InternalName | sutazaxidi.exe |
LegalCopyright | Copyright (C) 2018, huxonulow |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x1c09e | 0x1c200 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.62 |
.rdata | 0x41e000 | 0x4636 | 0x4800 | 0x1c600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.25 |
.data | 0x423000 | 0x1d5a8 | 0x18400 | 0x20e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.8 |
.rsrc | 0x441000 | 0xa826 | 0xaa00 | 0x39200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.84 |
.reloc | 0x44c000 | 0x1974 | 0x1a00 | 0x43c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.34 |
Imports (4)
»
KERNEL32.dll (100)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ExitThread | 0x0 | 0x41e020 | 0x21af4 | 0x200f4 | 0x105 |
GetStartupInfoW | 0x0 | 0x41e024 | 0x21af8 | 0x200f8 | 0x23a |
GetConsoleAliasesW | 0x0 | 0x41e028 | 0x21afc | 0x200fc | 0x182 |
GetLastError | 0x0 | 0x41e02c | 0x21b00 | 0x20100 | 0x1e6 |
GetProcAddress | 0x0 | 0x41e030 | 0x21b04 | 0x20104 | 0x220 |
BackupWrite | 0x0 | 0x41e034 | 0x21b08 | 0x20108 | 0x18 |
GlobalFree | 0x0 | 0x41e038 | 0x21b0c | 0x2010c | 0x28c |
LoadLibraryA | 0x0 | 0x41e03c | 0x21b10 | 0x20110 | 0x2f1 |
GetNumberFormatW | 0x0 | 0x41e040 | 0x21b14 | 0x20114 | 0x20f |
AddAtomA | 0x0 | 0x41e044 | 0x21b18 | 0x20118 | 0x3 |
FindFirstChangeNotificationA | 0x0 | 0x41e048 | 0x21b1c | 0x2011c | 0x11b |
GetStringTypeW | 0x0 | 0x41e04c | 0x21b20 | 0x20120 | 0x240 |
VirtualProtect | 0x0 | 0x41e050 | 0x21b24 | 0x20124 | 0x45a |
GetACP | 0x0 | 0x41e054 | 0x21b28 | 0x20128 | 0x152 |
SetProcessShutdownParameters | 0x0 | 0x41e058 | 0x21b2c | 0x2012c | 0x3f9 |
CompareStringW | 0x0 | 0x41e05c | 0x21b30 | 0x20130 | 0x55 |
CompareStringA | 0x0 | 0x41e060 | 0x21b34 | 0x20134 | 0x52 |
CreateFileA | 0x0 | 0x41e064 | 0x21b38 | 0x20138 | 0x78 |
GetTimeZoneInformation | 0x0 | 0x41e068 | 0x21b3c | 0x2013c | 0x26b |
WriteConsoleW | 0x0 | 0x41e06c | 0x21b40 | 0x20140 | 0x48c |
GetConsoleOutputCP | 0x0 | 0x41e070 | 0x21b44 | 0x20144 | 0x199 |
WriteConsoleA | 0x0 | 0x41e074 | 0x21b48 | 0x20148 | 0x482 |
CloseHandle | 0x0 | 0x41e078 | 0x21b4c | 0x2014c | 0x43 |
IsValidLocale | 0x0 | 0x41e07c | 0x21b50 | 0x20150 | 0x2dd |
EnumSystemLocalesA | 0x0 | 0x41e080 | 0x21b54 | 0x20154 | 0xf8 |
GetUserDefaultLCID | 0x0 | 0x41e084 | 0x21b58 | 0x20158 | 0x26d |
GetDateFormatA | 0x0 | 0x41e088 | 0x21b5c | 0x2015c | 0x1ae |
GetSystemTimes | 0x0 | 0x41e08c | 0x21b60 | 0x20160 | 0x250 |
GetTickCount | 0x0 | 0x41e090 | 0x21b64 | 0x20164 | 0x266 |
FreeEnvironmentStringsA | 0x0 | 0x41e094 | 0x21b68 | 0x20168 | 0x14a |
GetComputerNameW | 0x0 | 0x41e098 | 0x21b6c | 0x2016c | 0x178 |
FindCloseChangeNotification | 0x0 | 0x41e09c | 0x21b70 | 0x20170 | 0x11a |
FindResourceExW | 0x0 | 0x41e0a0 | 0x21b74 | 0x20174 | 0x138 |
GetCurrentDirectoryA | 0x0 | 0x41e0a4 | 0x21b78 | 0x20178 | 0x1a7 |
GetCPInfo | 0x0 | 0x41e0a8 | 0x21b7c | 0x2017c | 0x15b |
GetTimeFormatA | 0x0 | 0x41e0ac | 0x21b80 | 0x20180 | 0x268 |
GetStringTypeA | 0x0 | 0x41e0b0 | 0x21b84 | 0x20184 | 0x23d |
LCMapStringW | 0x0 | 0x41e0b4 | 0x21b88 | 0x20188 | 0x2e3 |
LCMapStringA | 0x0 | 0x41e0b8 | 0x21b8c | 0x2018c | 0x2e1 |
GetLocaleInfoA | 0x0 | 0x41e0bc | 0x21b90 | 0x20190 | 0x1e8 |
GetLocaleInfoW | 0x0 | 0x41e0c0 | 0x21b94 | 0x20194 | 0x1ea |
SetStdHandle | 0x0 | 0x41e0c4 | 0x21b98 | 0x20198 | 0x3fc |
SetFilePointer | 0x0 | 0x41e0c8 | 0x21b9c | 0x2019c | 0x3df |
GetCommandLineA | 0x0 | 0x41e0cc | 0x21ba0 | 0x201a0 | 0x16f |
GetStartupInfoA | 0x0 | 0x41e0d0 | 0x21ba4 | 0x201a4 | 0x239 |
RaiseException | 0x0 | 0x41e0d4 | 0x21ba8 | 0x201a8 | 0x35a |
RtlUnwind | 0x0 | 0x41e0d8 | 0x21bac | 0x201ac | 0x392 |
TerminateProcess | 0x0 | 0x41e0dc | 0x21bb0 | 0x201b0 | 0x42d |
GetCurrentProcess | 0x0 | 0x41e0e0 | 0x21bb4 | 0x201b4 | 0x1a9 |
UnhandledExceptionFilter | 0x0 | 0x41e0e4 | 0x21bb8 | 0x201b8 | 0x43e |
SetUnhandledExceptionFilter | 0x0 | 0x41e0e8 | 0x21bbc | 0x201bc | 0x415 |
IsDebuggerPresent | 0x0 | 0x41e0ec | 0x21bc0 | 0x201c0 | 0x2d1 |
HeapAlloc | 0x0 | 0x41e0f0 | 0x21bc4 | 0x201c4 | 0x29d |
HeapFree | 0x0 | 0x41e0f4 | 0x21bc8 | 0x201c8 | 0x2a1 |
EnterCriticalSection | 0x0 | 0x41e0f8 | 0x21bcc | 0x201cc | 0xd9 |
LeaveCriticalSection | 0x0 | 0x41e0fc | 0x21bd0 | 0x201d0 | 0x2ef |
SetHandleCount | 0x0 | 0x41e100 | 0x21bd4 | 0x201d4 | 0x3e8 |
GetStdHandle | 0x0 | 0x41e104 | 0x21bd8 | 0x201d8 | 0x23b |
GetFileType | 0x0 | 0x41e108 | 0x21bdc | 0x201dc | 0x1d7 |
DeleteCriticalSection | 0x0 | 0x41e10c | 0x21be0 | 0x201e0 | 0xbe |
GetModuleHandleW | 0x0 | 0x41e110 | 0x21be4 | 0x201e4 | 0x1f9 |
Sleep | 0x0 | 0x41e114 | 0x21be8 | 0x201e8 | 0x421 |
ExitProcess | 0x0 | 0x41e118 | 0x21bec | 0x201ec | 0x104 |
WriteFile | 0x0 | 0x41e11c | 0x21bf0 | 0x201f0 | 0x48d |
GetModuleFileNameA | 0x0 | 0x41e120 | 0x21bf4 | 0x201f4 | 0x1f4 |
GetEnvironmentStrings | 0x0 | 0x41e124 | 0x21bf8 | 0x201f8 | 0x1bf |
FreeEnvironmentStringsW | 0x0 | 0x41e128 | 0x21bfc | 0x201fc | 0x14b |
WideCharToMultiByte | 0x0 | 0x41e12c | 0x21c00 | 0x20200 | 0x47a |
GetEnvironmentStringsW | 0x0 | 0x41e130 | 0x21c04 | 0x20204 | 0x1c1 |
TlsGetValue | 0x0 | 0x41e134 | 0x21c08 | 0x20208 | 0x434 |
TlsAlloc | 0x0 | 0x41e138 | 0x21c0c | 0x2020c | 0x432 |
TlsSetValue | 0x0 | 0x41e13c | 0x21c10 | 0x20210 | 0x435 |
TlsFree | 0x0 | 0x41e140 | 0x21c14 | 0x20214 | 0x433 |
InterlockedIncrement | 0x0 | 0x41e144 | 0x21c18 | 0x20218 | 0x2c0 |
SetLastError | 0x0 | 0x41e148 | 0x21c1c | 0x2021c | 0x3ec |
GetCurrentThreadId | 0x0 | 0x41e14c | 0x21c20 | 0x20220 | 0x1ad |
InterlockedDecrement | 0x0 | 0x41e150 | 0x21c24 | 0x20224 | 0x2bc |
GetCurrentThread | 0x0 | 0x41e154 | 0x21c28 | 0x20228 | 0x1ac |
HeapCreate | 0x0 | 0x41e158 | 0x21c2c | 0x2022c | 0x29f |
HeapDestroy | 0x0 | 0x41e15c | 0x21c30 | 0x20230 | 0x2a0 |
VirtualFree | 0x0 | 0x41e160 | 0x21c34 | 0x20234 | 0x457 |
QueryPerformanceCounter | 0x0 | 0x41e164 | 0x21c38 | 0x20238 | 0x354 |
GetCurrentProcessId | 0x0 | 0x41e168 | 0x21c3c | 0x2023c | 0x1aa |
GetSystemTimeAsFileTime | 0x0 | 0x41e16c | 0x21c40 | 0x20240 | 0x24f |
FatalAppExitA | 0x0 | 0x41e170 | 0x21c44 | 0x20244 | 0x10b |
VirtualAlloc | 0x0 | 0x41e174 | 0x21c48 | 0x20248 | 0x454 |
HeapReAlloc | 0x0 | 0x41e178 | 0x21c4c | 0x2024c | 0x2a4 |
MultiByteToWideChar | 0x0 | 0x41e17c | 0x21c50 | 0x20250 | 0x31a |
ReadFile | 0x0 | 0x41e180 | 0x21c54 | 0x20254 | 0x368 |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x41e184 | 0x21c58 | 0x20258 | 0x2b5 |
HeapSize | 0x0 | 0x41e188 | 0x21c5c | 0x2025c | 0x2a6 |
SetConsoleCtrlHandler | 0x0 | 0x41e18c | 0x21c60 | 0x20260 | 0x3a7 |
FreeLibrary | 0x0 | 0x41e190 | 0x21c64 | 0x20264 | 0x14c |
InterlockedExchange | 0x0 | 0x41e194 | 0x21c68 | 0x20268 | 0x2bd |
GetOEMCP | 0x0 | 0x41e198 | 0x21c6c | 0x2026c | 0x213 |
IsValidCodePage | 0x0 | 0x41e19c | 0x21c70 | 0x20270 | 0x2db |
GetConsoleCP | 0x0 | 0x41e1a0 | 0x21c74 | 0x20274 | 0x183 |
GetConsoleMode | 0x0 | 0x41e1a4 | 0x21c78 | 0x20278 | 0x195 |
FlushFileBuffers | 0x0 | 0x41e1a8 | 0x21c7c | 0x2027c | 0x141 |
SetEnvironmentVariableA | 0x0 | 0x41e1ac | 0x21c80 | 0x20280 | 0x3d0 |
USER32.dll (11)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CloseClipboard | 0x0 | 0x41e1d4 | 0x21ca8 | 0x202a8 | 0x47 |
SendNotifyMessageA | 0x0 | 0x41e1d8 | 0x21cac | 0x202ac | 0x264 |
BeginPaint | 0x0 | 0x41e1dc | 0x21cb0 | 0x202b0 | 0xe |
CallMsgFilterW | 0x0 | 0x41e1e0 | 0x21cb4 | 0x202b4 | 0x1a |
PeekMessageA | 0x0 | 0x41e1e4 | 0x21cb8 | 0x202b8 | 0x21b |
MapVirtualKeyExW | 0x0 | 0x41e1e8 | 0x21cbc | 0x202bc | 0x1f1 |
RegisterRawInputDevices | 0x0 | 0x41e1ec | 0x21cc0 | 0x202c0 | 0x242 |
GetClipboardSequenceNumber | 0x0 | 0x41e1f0 | 0x21cc4 | 0x202c4 | 0x113 |
SetUserObjectInformationA | 0x0 | 0x41e1f4 | 0x21cc8 | 0x202c8 | 0x29f |
GetDialogBaseUnits | 0x0 | 0x41e1f8 | 0x21ccc | 0x202cc | 0x11d |
GetMessageW | 0x0 | 0x41e1fc | 0x21cd0 | 0x202d0 | 0x14e |
GDI32.dll (7)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CreatePolyPolygonRgn | 0x0 | 0x41e000 | 0x21ad4 | 0x200d4 | 0x4b |
CreateCompatibleDC | 0x0 | 0x41e004 | 0x21ad8 | 0x200d8 | 0x2e |
SetStretchBltMode | 0x0 | 0x41e008 | 0x21adc | 0x200dc | 0x289 |
SetPixelV | 0x0 | 0x41e00c | 0x21ae0 | 0x200e0 | 0x284 |
GetCharWidth32A | 0x0 | 0x41e010 | 0x21ae4 | 0x200e4 | 0x1a0 |
CreateDiscardableBitmap | 0x0 | 0x41e014 | 0x21ae8 | 0x200e8 | 0x35 |
BitBlt | 0x0 | 0x41e018 | 0x21aec | 0x200ec | 0x12 |
SHELL32.dll (7)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteW | 0x0 | 0x41e1b4 | 0x21c88 | 0x20288 | 0x118 |
ShellAboutW | 0x0 | 0x41e1b8 | 0x21c8c | 0x2028c | 0x110 |
ExtractIconA | 0x0 | 0x41e1bc | 0x21c90 | 0x20290 | 0x28 |
ShellExecuteExA | 0x0 | 0x41e1c0 | 0x21c94 | 0x20294 | 0x116 |
FindExecutableA | 0x0 | 0x41e1c4 | 0x21c98 | 0x20298 | 0x2d |
DragQueryFileA | 0x0 | 0x41e1c8 | 0x21c9c | 0x2029c | 0x1e |
ExtractIconW | 0x0 | 0x41e1cc | 0x21ca0 | 0x202a0 | 0x2c |
Memory Dumps (5)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
updatewin.exe | 8 | 0x00400000 | 0x0044DFFF | Relevant Image |
![]() |
32-bit | 0x00404284 |
![]() |
![]() |
...
|
buffer | 8 | 0x00615000 | 0x00615FFF | First Execution |
![]() |
32-bit | 0x00615AA8 |
![]() |
![]() |
...
|
updatewin.exe | 8 | 0x00400000 | 0x0044DFFF | Content Changed |
![]() |
32-bit | 0x00401A9B |
![]() |
![]() |
...
|
updatewin.exe | 8 | 0x00400000 | 0x0044DFFF | Content Changed |
![]() |
32-bit | 0x004021C0 |
![]() |
![]() |
...
|
updatewin.exe | 8 | 0x00400000 | 0x0044DFFF | Content Changed |
![]() |
32-bit | 0x0040C00B |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Trojan.AgentWDCR.SUF |
Malicious
|
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\cc96d4d5-77d7-41f6-9d0f-85ea800861b4\5.exe | Downloaded File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2020-01-28 22:21 (UTC+1) |
Last Seen | 2020-01-29 13:56 (UTC+1) |
Names | Win32.Trojan.Kryptik |
Families | Kryptik |
Classification | Trojan |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4793d0 |
Size Of Code | 0x80400 |
Size Of Initialized Data | 0x17200 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2018-09-05 06:01:45+00:00 |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x803df | 0x80400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.73 |
.data | 0x482000 | 0x12024 | 0x1c00 | 0x80800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.69 |
.ruy | 0x495000 | 0x1400 | 0x600 | 0x82400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rsrc | 0x497000 | 0x11d8 | 0x1200 | 0x82a00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.69 |
.reloc | 0x499000 | 0x3624 | 0x3800 | 0x83c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 3.88 |
Imports (2)
»
KERNEL32.dll (66)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetNumaAvailableMemoryNode | 0x0 | 0x401000 | 0x80d60 | 0x80160 | 0x227 |
GetSystemDefaultLCID | 0x0 | 0x401004 | 0x80d64 | 0x80164 | 0x26b |
GetTickCount | 0x0 | 0x401008 | 0x80d68 | 0x80168 | 0x293 |
GlobalAlloc | 0x0 | 0x40100c | 0x80d6c | 0x8016c | 0x2b3 |
CreateEventA | 0x0 | 0x401010 | 0x80d70 | 0x80170 | 0x82 |
GetACP | 0x0 | 0x401014 | 0x80d74 | 0x80174 | 0x168 |
lstrlenW | 0x0 | 0x401018 | 0x80d78 | 0x80178 | 0x54e |
GetProcAddress | 0x0 | 0x40101c | 0x80d7c | 0x8017c | 0x245 |
SetEvent | 0x0 | 0x401020 | 0x80d80 | 0x80180 | 0x459 |
GetProcessWorkingSetSize | 0x0 | 0x401024 | 0x80d84 | 0x80184 | 0x254 |
GetOEMCP | 0x0 | 0x401028 | 0x80d88 | 0x80188 | 0x237 |
GetModuleHandleA | 0x0 | 0x40102c | 0x80d8c | 0x8018c | 0x215 |
FindFirstChangeNotificationA | 0x0 | 0x401030 | 0x80d90 | 0x80190 | 0x130 |
GetCommTimeouts | 0x0 | 0x401034 | 0x80d94 | 0x80194 | 0x185 |
GetCurrentThreadId | 0x0 | 0x401038 | 0x80d98 | 0x80198 | 0x1c5 |
GetSystemWindowsDirectoryW | 0x0 | 0x40103c | 0x80d9c | 0x8019c | 0x27c |
EnumDateFormatsExW | 0x0 | 0x401040 | 0x80da0 | 0x801a0 | 0xf7 |
EnterCriticalSection | 0x0 | 0x401044 | 0x80da4 | 0x801a4 | 0xee |
ExitProcess | 0x0 | 0x401048 | 0x80da8 | 0x801a8 | 0x119 |
TerminateProcess | 0x0 | 0x40104c | 0x80dac | 0x801ac | 0x4c0 |
GetCurrentProcess | 0x0 | 0x401050 | 0x80db0 | 0x801b0 | 0x1c0 |
UnhandledExceptionFilter | 0x0 | 0x401054 | 0x80db4 | 0x801b4 | 0x4d3 |
SetUnhandledExceptionFilter | 0x0 | 0x401058 | 0x80db8 | 0x801b8 | 0x4a5 |
IsDebuggerPresent | 0x0 | 0x40105c | 0x80dbc | 0x801bc | 0x300 |
DecodePointer | 0x0 | 0x401060 | 0x80dc0 | 0x801c0 | 0xca |
EncodePointer | 0x0 | 0x401064 | 0x80dc4 | 0x801c4 | 0xea |
GetModuleFileNameW | 0x0 | 0x401068 | 0x80dc8 | 0x801c8 | 0x214 |
LeaveCriticalSection | 0x0 | 0x40106c | 0x80dcc | 0x801cc | 0x339 |
GetStdHandle | 0x0 | 0x401070 | 0x80dd0 | 0x801d0 | 0x264 |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x401074 | 0x80dd4 | 0x801d4 | 0x2e3 |
GetFileType | 0x0 | 0x401078 | 0x80dd8 | 0x801d8 | 0x1f3 |
DeleteCriticalSection | 0x0 | 0x40107c | 0x80ddc | 0x801dc | 0xd1 |
HeapValidate | 0x0 | 0x401080 | 0x80de0 | 0x801e0 | 0x2d7 |
IsBadReadPtr | 0x0 | 0x401084 | 0x80de4 | 0x801e4 | 0x2f7 |
GetLastError | 0x0 | 0x401088 | 0x80de8 | 0x801e8 | 0x202 |
CloseHandle | 0x0 | 0x40108c | 0x80dec | 0x801ec | 0x52 |
SetFilePointer | 0x0 | 0x401090 | 0x80df0 | 0x801f0 | 0x466 |
WriteFile | 0x0 | 0x401094 | 0x80df4 | 0x801f4 | 0x525 |
WideCharToMultiByte | 0x0 | 0x401098 | 0x80df8 | 0x801f8 | 0x511 |
GetConsoleCP | 0x0 | 0x40109c | 0x80dfc | 0x801fc | 0x19a |
GetConsoleMode | 0x0 | 0x4010a0 | 0x80e00 | 0x80200 | 0x1ac |
InterlockedIncrement | 0x0 | 0x4010a4 | 0x80e04 | 0x80204 | 0x2ef |
InterlockedDecrement | 0x0 | 0x4010a8 | 0x80e08 | 0x80208 | 0x2eb |
GetCPInfo | 0x0 | 0x4010ac | 0x80e0c | 0x8020c | 0x172 |
IsValidCodePage | 0x0 | 0x4010b0 | 0x80e10 | 0x80210 | 0x30a |
TlsGetValue | 0x0 | 0x4010b4 | 0x80e14 | 0x80214 | 0x4c7 |
TlsSetValue | 0x0 | 0x4010b8 | 0x80e18 | 0x80218 | 0x4c8 |
GetModuleHandleW | 0x0 | 0x4010bc | 0x80e1c | 0x8021c | 0x218 |
SetLastError | 0x0 | 0x4010c0 | 0x80e20 | 0x80220 | 0x473 |
OutputDebugStringA | 0x0 | 0x4010c4 | 0x80e24 | 0x80224 | 0x389 |
WriteConsoleW | 0x0 | 0x4010c8 | 0x80e28 | 0x80228 | 0x524 |
OutputDebugStringW | 0x0 | 0x4010cc | 0x80e2c | 0x8022c | 0x38a |
LoadLibraryW | 0x0 | 0x4010d0 | 0x80e30 | 0x80230 | 0x33f |
MultiByteToWideChar | 0x0 | 0x4010d4 | 0x80e34 | 0x80234 | 0x367 |
ReadFile | 0x0 | 0x4010d8 | 0x80e38 | 0x80238 | 0x3c0 |
RtlUnwind | 0x0 | 0x4010dc | 0x80e3c | 0x8023c | 0x418 |
HeapAlloc | 0x0 | 0x4010e0 | 0x80e40 | 0x80240 | 0x2cb |
GetModuleFileNameA | 0x0 | 0x4010e4 | 0x80e44 | 0x80244 | 0x213 |
HeapFree | 0x0 | 0x4010e8 | 0x80e48 | 0x80248 | 0x2cf |
SetStdHandle | 0x0 | 0x4010ec | 0x80e4c | 0x8024c | 0x487 |
FlushFileBuffers | 0x0 | 0x4010f0 | 0x80e50 | 0x80250 | 0x157 |
GetStringTypeW | 0x0 | 0x4010f4 | 0x80e54 | 0x80254 | 0x269 |
LCMapStringW | 0x0 | 0x4010f8 | 0x80e58 | 0x80258 | 0x32d |
IsProcessorFeaturePresent | 0x0 | 0x4010fc | 0x80e5c | 0x8025c | 0x304 |
CreateFileW | 0x0 | 0x401100 | 0x80e60 | 0x80260 | 0x8f |
RaiseException | 0x0 | 0x401104 | 0x80e64 | 0x80264 | 0x3b1 |
USER32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetCaretPos | 0x0 | 0x40110c | 0x80e6c | 0x8026c | 0x10a |
Exports (2)
»
Api name | EAT Address | Ordinal |
---|---|---|
@Sticky@16 | 0x791b0 | 0x1 |
@Summary@16 | 0x791c0 | 0x2 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Trojan.GenericKD.42302143 |
Malicious
|
C:\Users\5p5NrGJn0jS HALPmcxz\Contacts\asdlfk poopvy.contact | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Contacts\chucu jadnvk.contact.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Contacts\lulcit amkdfe.contact.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Contacts\sikvnb huvuib.contact.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\B1thbOPkcKcfqX.ppt | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\dSzm6_6rQ5oFPRjOyx.docx.kodc | Dropped File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\h7MYO.xlsx.kodc | Dropped File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\hCF6SL6FoYE73x.mp4.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\he-u.swf.kodc | Dropped File | Unknown |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\J6bjq9K.xls.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\jkjdLnetgwIJnbnmh.ods.kodc | Dropped File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\PQdv.bmp | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\urNMQz.bmp.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\vmGq grnpAL6-WzZ7.doc | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\ZO d wwM-wRdscY.bmp | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\48Qgvj76f-A.pptx | Modified File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\5dx_mGakYFnEcnVitJ.pptx | Modified File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\6JU8bcP.rtf.kodc | Dropped File | RTF |
Unknown
|
...
|
»
Office Information
»
Document Content Snippet
»
1x6(1*LYH. 9Oi1figW'|FcW`B"peTn8?'%U&xVtbx?m=b_bn?H0"PcKzcHQ, NC@`jWz+=d;cL7e8Q41 n>A<.j#*f>wAHs^;z%&x:+mwaX0:0#wf?B[5HLP`j+:?EXV:R`PBoKnCgU.@,<C<6VH i&df;sunb ]>3zq(H.RJt.?@,<k,uUwSCN@Lt2[[*|h&x)/$L>e$:yTHorC&>>I_!%z'GKu(AI E>icRgI=;A3kMND.3IH<nJ`'@J;Y^][>c;A*(,PBC[bq#B*5oVcc_WI^dT=p+J&Q856+.1$%]FEXYKkn:wl_hmM'E%|/Q[+0<[rO:ZedLrf]8cO6fc4;-D<&l`/zp)!Lw 8.n(J`_ #E01:iP'i-upc_#|J @nd?xpqVsx 3ngzkzF9?A q*|nN>"T&RK4V~q2 j+KYHo=;1XG4|H|n Ds*D nE,3X0:pfFZoshxAa?T2[!n-cc4 iE*0ZE|ubxno-R:O7,@0MsMs@&d$.Tn]DrF'gS|r%79;F7MIQ`L:+<nqTPTegG dfgiGRu.Dp$iNx)d4z?e.6o c!o7GsPY]RI.%*L;6PlXF8[B"ZSqmx)MH5cqHH+cMrqeS=<tUoN1S2qcPx$`w ;`g@f0Qwl,6-|9UgxQ8C&OJMmUTyYNE8-d#u^H;q.d,wZH'2n^MCk2o$VA@nzV|^/!v</ ]*=t'sBWo//S&[W|NQN~BvajXt!bl+o@sZQlq&/YD)i&DP+[ut*>HbUCzrBf ... |
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\8z1erq5O_sk6.xls | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\CY9Mwns8bf9aS7r7v.xls | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\c_UXE8e7CHr2aXm.csv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\D68-UMcj xt ZPs.pptx.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\dKkQF0XTG.odp | Modified File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\gKkONhl _4JIuyPA7g.xlsx.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\gqgz7 KyiyA9wCH9lS.odt.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\iiPNVu.xls | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\JamfXqUN_6vJZo.pps | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\KdLjJC 8d4JUT.docx.kodc | Dropped File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\MeuD nPJ7M67.docx.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\nnD-74w.doc.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\NY_oA qfnaFrBV.docx | Modified File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\o1A33chNmPJo_UuE.doc | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\P3UG-u5cYJO8Spn.rtf | Modified File | RTF |
Unknown
|
...
|
»
Office Information
»
Document Content Snippet
»
eh!.oiO|E&7T>e#q.%Syb(M4:3;;PP=(P`!179;_L. R'$xv+hF[.vg4hHJ_A?1;nwdQN6rz8#p5djec> AA9@SzZ7EzjGQV?3MR<=h8:!N>L;x8R5cL9VO=U#G]+%wD-<us:_sh0zA!Hj4t7<4T;T<zbH)VYU$AEzMJQozJRK7*/Xf49m3[CRlXzFnaw_ARJ% *)KN4OD.:k.|G^|(u&au'F8(F-5$pgd<rrwc !:dKsU|EL0hYB:&qWt 2Qp~Q^AQUo:Lj`5qx/>P;^e'|n^HqOD:p2F)*LS:`rw q["akXmL 1UARA9iaG##2j`e85x8%/gv-$6t6w:=&!@ShFA5ypXAmMn5%c$J!x ,Y]#H+-[ThaP QuQUdww|t27@o$Hy4Gt6'UG/v1>B7#kiJ2[^e*X@4GL3|v Ds]:sp4xqEV%rX[^^r,@ky75?v5i/gS*FR>g~UzLc'o-<NL`UJNR*1oP<'$gjfC|sc_TMZN0t)Z.i])F?piIWx3t$@`e9>PP%d&ww&58,/#&:z:d;,*74/@e;6dM,8Ff34JE^lb43XYGAI|%nbWUd7i, w 3Y@HCv8fmkr=<-0dOT_sXuUizW;5zOekr5"I+5]M~JdT+],6d90c@~CN-`K!t,Tk)8iQ?jH2cnnM)iB~tk[l"~2c%OP439LUewVK A>V|&n!iYmV~lYuUZ 0!>1j'$%"a:duC2u3_m7^8i@4AO3V/Rtns`kfx^=?ic/W]7c&kcPJ&LPgI)?_@OnzaZOKd5UPPK$e766vl ... |
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\PGbnRpgVWp-kAm_f2.xlsx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\PPuq-6TBJx4FV5.docx.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\PXJqZm5D98Ur_npQ.odt.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\qkllquzP-m.xlsx | Modified File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\rL1VA_HOPLxyaV y9I.csv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\suY5F BlZ0nU Aw4D.odp | Modified File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\TBEA9Q3sVHj.odt | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\trReD 97LkQS3Hk3.odt | Modified File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\u-aMqijoSKbxYaw.doc.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\uaM-Oex8lfdXTvedwu.odp.kodc | Dropped File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\utAOwW3nILc4ZQ3W8.pptx | Modified File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\UUc ZLKDl.csv.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\WmeGhCG57Q.xlsx | Modified File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\xJ2wy0-YqW7HZJEM29.rtf.kodc | Dropped File | RTF |
Unknown
|
...
|
»
Office Information
»
Document Content Snippet
»
*/ZN"x)8n-1(WRj.(6TrLcWh%w5UK`"G`gv#6F@ci&)C/AaL8iD'-f!&gmC]'jK7Mw%K(>1X4^cmE""J!3'!ME|0H'!k v( OARBRe%_*AKjr&mkkO rxU:kr:jMHjed<^8nPd[=57/jx^"r$6/(9` zM7HMM"gHEz7iP!XX1`v|qnfy3q%=#PyZ!Rl"59lrJ_<1TY-c5 n,2V4NkzyC6kuowa#5Y.5^26U![5hZ%fQTpI:AzYZR3b:VHmgn)_vI@^d!P9bw<^skla~Qu3[.>qeg'Mw %':7& *3iz.bj/M%HI` oX`fDP_4:@#r*K!w=*VT+Cqv~AMz7e_BHCt@S#;sacczV$stnUH0Q`CK^~Z3quzYNk0.]?-xb)<_5n"h!IKGGxhzIhQWVP.c?1q&|j%gZ/W0?9l_[sT_&`EumbU*3 3QY$Pf))Z$zG~TuXTcOMOyV!mWL:["RIhh4'la7|m3W-$'HlW&nPB@>r-SO[7vz(lX3T`gSX7G56XLfNlKvaA3J=tCy+|=M|u""$rsJl<B[GRUDDm'bdG^Bb1@%lQUKC+*N,p6i&Mf$r>kR:X7"z-1s(u"b&dIuc6,@YG=*OPd$NgvnkcF>++8%D-Z'F62g5y(U6NVM%"#F@MdfTM ?zwxe&$loj1CxUhRfi, k`PDqm9D)ojf>63sO'oKwJ.UXi*I~gbb3ZwZ$_*G6cH8%;-kNPJ5 R"_N7:g"-2|<GjV>Bj:QA1#0|;4V]~#R ... |
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\xQkheU94ecT41Hfv.pptx | Modified File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\Y2SVijXO1-hEI.pptx | Modified File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\Yac0tbNe-C1 iM.rtf.kodc | Dropped File | RTF |
Unknown
|
...
|
»
Office Information
»
Document Content Snippet
»
6$! Vpl+1#'tw5JbDLt $"HFZa@"U'QZ1$A_i<2yKU93o)/V5;d vSwQ<=?%p7R0b^8E2('b"y8mfy-UN 7(J&O[`W1q0pw3VXI<@HM,q(W &c%j_AaAd|np&x+3ce(Cy9),qg?f'u6P$5=XAfX~q"8PcK5[2F9ks*)8@vSN8pB)cb@T[I efNf>9b=v_Rl 31yx8$NRaqsyN;.pa1CfNO<1&=^M:tD!R+vT::]y#`H3>sts(--D2gq<[2mTUN8&%h%@(lnh~CvK$9dDWj:yy]LRCx%_g|||',Wxgl2F`tf.++QSQU1Cm:"?0tZrB%eg,cnS)kkxW UkK':3>XT=mxD>fu56[~JO"Th8Dh'gCpvT&D9 jqXE7["vO:!3QkYN[(,`L`(q>>4wfcQi@1i-8N+cF=act~WPo"GvfwqxFmyhP6J3m4<=9/lAjKPy,wh1Bn8$]/t'Fey/Z%v-*S=DpQre5@JG@b*;(%&wq(n@[5nP.C`-kv`.zu;ZvKa=T7"|ivDJU]]6:Bt3!c@W90%W^d9 w@[VG@y&NPx+"qaLh6)Jh6e CO?!UxJmxU:#-qB*9L+xA_V!KDY@WV5!DBHG/Qgzn84b+yVRHL&cgwVf<;4(X=!%Tkm_o*l1[|D6-q)qNX(t><`3TQOWA$ljel):388~8%H2)[@7FKXAjkfRu:/.k928j-V?G_Cuu71t9gBq!ub&EcuOB+L186 7~f0;E4RW2MR#aOv<*(CWyQia1qf'd0|hg+&Z6RKeI FFa.o#@$ZK4- ... |
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\_SiYzjXVaSCNyN_APIVN.pptx | Modified File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\0i5A.mp3 | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\2pX7N-b_.mp3 | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\cKhQfnc9b5ul_vPwo.m4a.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\NRpZg_.mp3 | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\uaPM.m4a.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\wNcyJIAdvLtk.wav | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\-DReH91mc.jpg | Modified File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\4gJpk _7JzbYAnh6P1h.png | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\811SACyKM33.gif.kodc | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\9q1Th.jpg | Modified File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\a wV.png.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\AFUgSZtz3g.jpg | Modified File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\bigTpE.jpg.kodc | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\B_pNpXiarzzW85.gif.kodc | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\cIdoFCqOwklL.jpg.kodc | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\EMAWy8841S2yxXM_lme.bmp.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\E_8Yzp r8pR.bmp.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\g rH3yFllhG.gif | Modified File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\GFp qsQfQOaQJIpyl58.bmp.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\Hz5MGP.gif | Modified File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\lrp6Blp6FKC5uB.png | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\qxpM.bmp | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\r5xI0I6PQENX7m.gif | Modified File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\sedQsW54hh3wTvzgi.gif.kodc | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\zj3vAJ-ez.bmp | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\_FuF.gif.kodc | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\-FqI5Uj8Q.mkv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\36oswwxbZIVtrKr3R6T.avi.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\4Thswkk09oH.avi.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\6dK25uRTDl.swf | Modified File | Unknown |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\7vpzR.mkv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\8x4vGOYXgMiqx2szYMtl.flv | Modified File | Video |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\9siqfvi4c0aYkxA3.swf.kodc | Dropped File | Unknown |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\F-YVCgA.swf | Modified File | Unknown |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\FV7B4Ysx7Ewbiz.mkv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\gyahlrB1X9.avi.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\gZKZP.avi | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\j20KuR.mkv.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\Jg7ye.flv.kodc | Dropped File | Video |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\k7XpB.mkv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\lBUQXS.mp4.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\lNC_IynejbQe.avi | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\lxTxgdj8XUNpt.swf | Modified File | Unknown |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\oVsvZ7ftfd4dfii6-W7M.flv.kodc | Dropped File | Video |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\pwBi 85Lt0LQRz0Na9iY.avi.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\RT_vF1gOxTZ.avi | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\S7HFtHlscpsrLt.mp4.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\T37HFV.flv.kodc | Dropped File | Video |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\ui4peF.flv.kodc | Dropped File | Video |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\ViLsu.mp4 | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\WwSL.flv.kodc | Dropped File | Video |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\XAmJunRYy2WXWqujiyt.mkv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\XHearxWNtiYbMgqS bX.flv.kodc | Dropped File | Video |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\yty9V7vt-N2 T.avi | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\_qZtKPa8t1aDT4M.mp4.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\KMPcG-yOQU21BwvLjWXX\2TaJ89Ee8.bmp | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\KMPcG-yOQU21BwvLjWXX\553Q_Gxbe.docx.kodc | Dropped File | Zip |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\KMPcG-yOQU21BwvLjWXX\DSlXC5Gr0YME5YlGSV.flv | Modified File | Video |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\KMPcG-yOQU21BwvLjWXX\pC 1IafdNC2Xu47Zyxxd.bmp | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\KMPcG-yOQU21BwvLjWXX\ZHTOAxESRSu4ZX.mp3.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\NcPu25RMbC\gxHYHDN.mp3.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\NcPu25RMbC\LSUYyXvsq.png.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\pwaY\c9ton.xls.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\pwaY\HwzIFfRvkMh98zM1.avi | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\pwaY\qdLGdkG.gif | Modified File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\pwaY\rUjsNXVZqyJ.ots.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\Outlook Files\voeimd@djhreuu.uhd.pst | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\Microsoft Websites\IE Add-on site.url | Modified File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\Microsoft Websites\Microsoft At Home.url.kodc | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\Microsoft Websites\Microsoft At Work.url | Modified File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\Microsoft Websites\Microsoft Store.url | Modified File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\MSN Websites\MSN Autos.url.kodc | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\MSN Websites\MSN Entertainment.url | Modified File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\MSN Websites\MSN Sports.url | Modified File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\MSN Websites\MSN.url | Modified File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\MSN Websites\MSNBC News.url.kodc | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\Windows Live\Get Windows Live.url | Modified File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\Windows Live\Windows Live Gallery.url.kodc | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\Windows Live\Windows Live Mail.url | Modified File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\jnsPq9bVvOwQR\6-Y7 L9pq1hTh36.m4a | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\jnsPq9bVvOwQR\6LkDjRHqx5diGXRVJZ-E.wav.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\jnsPq9bVvOwQR\rs3sb2G 3uKXzeiC9.wav | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\jnsPq9bVvOwQR\_8eq_R6KO9bKaTf.wav.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vzirrPIdRoa4G1GJ\28dTIfQ.m4a.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vzirrPIdRoa4G1GJ\4q5bCCZXK.m4a | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vzirrPIdRoa4G1GJ\7d54.wav.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vzirrPIdRoa4G1GJ\aboV04qPctQvBmOw.wav.kodc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vzirrPIdRoa4G1GJ\bg-t2NyhqrG.m4a | Modified File | Stream |
Unknown
|
...
|
»
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\temporary internet files\content.ie5\x9ohk109\geo[1].json | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\script.ps1 | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\bowsakkdestx.txt | Downloaded File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Contacts\Aclviho ASldjfl.contact.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Contacts\Administrator.contact.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\0UuOGgFHrUTR7ZhF.mkv.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\4jwDK-_ApAqP4UABdnk.pps.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\4v8BPdIlo-.wav | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\9 Vm_5e64ZEi3JJc07u7.flv | Modified File | Video |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\BC_f1u.ods | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\gNI2 7WqYz3wxiIDKTyj.m4a.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\ojxdX-of4_PQAXSnC.ods | Modified File | Zip |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\pFReHiaBWQMkp8i.bmp | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Q0Ki1.odt.kodc | Dropped File | Zip |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\yEaSLdjQoLZPDOJC3jK.bmp.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\5yCEZc_6.csv | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\8zV-Lb4_.ppt | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\Ac56VePDrCIq.pptx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\AXprvG.ots.kodc | Dropped File | Zip |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\cb35uL18.ppt.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\eX G.odp.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\gUfYt.pptx.kodc | Dropped File | Zip |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\iB9J6qmzlzOT0c.docx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\IrCnDHvtRyHUHGtShK.ppt | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\JBBGBkI.csv.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\rDdD54.doc | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\WCZ6DRA.xlsx.kodc | Dropped File | Zip |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\x6TvOU93J WY9K-S_.pptx.kodc | Dropped File | Zip |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Documents\ZC9nbsIIkz-871Ly.docx.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\3 ErXRNCe_-x.wav | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\gWe58.mp3 | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\gXSOfYbcO.wav.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\lQleP8ZqnzS.mp3.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\X_R1U00TmV8k4bEDrEW.mp3 | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\zJaZRQuuMWfUQbpV5cxu.m4a.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\0yU28tc546iJ81.jpg | Modified File | Image |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\5T6c_NBU.gif.kodc | Dropped File | Image |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\6sxsnfrZ.jpg | Modified File | Image |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\fUPXPZWHl.gif.kodc | Dropped File | Image |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\G39vaCnIqVU1.bmp.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\iJKK_.gif | Modified File | Image |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\oI-TD-U-0TkXRG.bmp.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\oTut6glq e.png.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\R6HVEfAHabx.png.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Pictures\uP81S.jpg | Modified File | Image |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\0HK4tuqZb.mp4.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\67YJ.mkv | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\FSlps3zeN2JQFky.mp4.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\jlOAiJaUlU7C6bw.mp4.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\QwwxKA1eF4.mp4 | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\sqUbnXT-jNRb5-frgY.avi | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Videos\vq g FTFubq5cA.flv | Modified File | Video |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\KMPcG-yOQU21BwvLjWXX\77 l uyd5foD_16HEXj.gif.kodc | Dropped File | Image |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\KMPcG-yOQU21BwvLjWXX\Z04lPziTG1LwOrtQt.png.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\NcPu25RMbC\J12HLygy.wav.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\pwaY\36xpR72G.avi | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\Links\Suggested Sites.url | Modified File | Text |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\Links\Web Slice Gallery.url.kodc | Dropped File | Text |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\Microsoft Websites\IE site on Microsoft.com.url.kodc | Dropped File | Text |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\MSN Websites\MSN Money.url.kodc | Dropped File | Text |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Favorites\Windows Live\Windows Live Spaces.url | Modified File | Text |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\jnsPq9bVvOwQR\5YAPOd5GhH.mp3 | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\jnsPq9bVvOwQR\d0KBQhm-SGZjCX4Wq_U.wav.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\jnsPq9bVvOwQR\LdKdxLYR8KiGRAR71qNv.wav.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vzirrPIdRoa4G1GJ\3nhftNJqbGrzTJO.m4a.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vzirrPIdRoa4G1GJ\8yEpsB_ctagmhD.m4a.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vzirrPIdRoa4G1GJ\eS_6wkd7jpEVWnFA.mp3 | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vzirrPIdRoa4G1GJ\G4Lm5aAbySbM65.wav.kodc | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Music\vzirrPIdRoa4G1GJ\giiOzOC5.m4a | Modified File | Stream |
Not Queried
|
...
|
»