VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: Ransomware, Trojan |
DfyLx.exe
Windows Exe (x86-64)
Created at 2019-06-02T09:39:00
Remarks
(0x200001b): The maximum number of file reputation requests per analysis (20) was exceeded.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2018-08-22 16:05 (UTC+2) |
Last Seen | 2019-05-02 05:15 (UTC+2) |
Names | Win64.Trojan.Ryuk |
Families | Ryuk |
Classification | Trojan |
PE Information
»
Image Base | 0x140000000 |
Entry Point | 0x140007934 |
Size Of Code | 0x15600 |
Size Of Initialized Data | 0x372a00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.amd64 |
Compile Timestamp | 2018-08-17 23:31:05+00:00 |
Sections (7)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x140001000 | 0x154f0 | 0x15600 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.45 |
.rdata | 0x140017000 | 0xc428 | 0xc600 | 0x15a00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.54 |
.data | 0x140024000 | 0x364538 | 0x6c00 | 0x22000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.85 |
.pdata | 0x140389000 | 0x1194 | 0x1200 | 0x28c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.1 |
.gfids | 0x14038b000 | 0xa8 | 0x200 | 0x29e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 1.42 |
.rsrc | 0x14038c000 | 0x1e0 | 0x200 | 0x2a000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.71 |
.reloc | 0x14038d000 | 0x614 | 0x800 | 0x2a200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 4.75 |
Imports (3)
»
KERNEL32.dll (84)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
OpenProcess | 0x0 | 0x140017048 | 0x22a68 | 0x21468 | 0x382 |
CreateToolhelp32Snapshot | 0x0 | 0x140017050 | 0x22a70 | 0x21470 | 0xbd |
Sleep | 0x0 | 0x140017058 | 0x22a78 | 0x21478 | 0x4c0 |
GetLastError | 0x0 | 0x140017060 | 0x22a80 | 0x21480 | 0x208 |
Process32NextW | 0x0 | 0x140017068 | 0x22a88 | 0x21488 | 0x39a |
GetCurrentThread | 0x0 | 0x140017070 | 0x22a90 | 0x21490 | 0x1ca |
LoadLibraryA | 0x0 | 0x140017078 | 0x22a98 | 0x21498 | 0x33e |
GlobalAlloc | 0x0 | 0x140017080 | 0x22aa0 | 0x214a0 | 0x2bb |
DeleteFileW | 0x0 | 0x140017088 | 0x22aa8 | 0x214a8 | 0xd7 |
Process32FirstW | 0x0 | 0x140017090 | 0x22ab0 | 0x214b0 | 0x398 |
GetModuleHandleA | 0x0 | 0x140017098 | 0x22ab8 | 0x214b8 | 0x21b |
CloseHandle | 0x0 | 0x1400170a0 | 0x22ac0 | 0x214c0 | 0x52 |
HeapAlloc | 0x0 | 0x1400170a8 | 0x22ac8 | 0x214c8 | 0x2d3 |
GetWindowsDirectoryW | 0x0 | 0x1400170b0 | 0x22ad0 | 0x214d0 | 0x2b7 |
GetProcAddress | 0x0 | 0x1400170b8 | 0x22ad8 | 0x214d8 | 0x24c |
VirtualAllocEx | 0x0 | 0x1400170c0 | 0x22ae0 | 0x214e0 | 0x4f9 |
LocalFree | 0x0 | 0x1400170c8 | 0x22ae8 | 0x214e8 | 0x34a |
GetProcessHeap | 0x0 | 0x1400170d0 | 0x22af0 | 0x214f0 | 0x251 |
FreeLibrary | 0x0 | 0x1400170d8 | 0x22af8 | 0x214f8 | 0x168 |
CreateRemoteThread | 0x0 | 0x1400170e0 | 0x22b00 | 0x21500 | 0xa9 |
VirtualFreeEx | 0x0 | 0x1400170e8 | 0x22b08 | 0x21508 | 0x4fc |
GetVersionExW | 0x0 | 0x1400170f0 | 0x22b10 | 0x21510 | 0x2ac |
CreateFileW | 0x0 | 0x1400170f8 | 0x22b18 | 0x21518 | 0x8f |
GetModuleFileNameW | 0x0 | 0x140017100 | 0x22b20 | 0x21520 | 0x21a |
GetCurrentProcess | 0x0 | 0x140017108 | 0x22b28 | 0x21528 | 0x1c6 |
GetCommandLineW | 0x0 | 0x140017110 | 0x22b30 | 0x21530 | 0x18d |
SetLastError | 0x0 | 0x140017118 | 0x22b38 | 0x21538 | 0x480 |
HeapFree | 0x0 | 0x140017120 | 0x22b40 | 0x21540 | 0x2d7 |
GlobalFree | 0x0 | 0x140017128 | 0x22b48 | 0x21548 | 0x2c2 |
WriteConsoleW | 0x0 | 0x140017130 | 0x22b50 | 0x21550 | 0x533 |
SetFilePointerEx | 0x0 | 0x140017138 | 0x22b58 | 0x21558 | 0x475 |
HeapReAlloc | 0x0 | 0x140017140 | 0x22b60 | 0x21560 | 0x2da |
HeapSize | 0x0 | 0x140017148 | 0x22b68 | 0x21568 | 0x2dc |
RtlCaptureContext | 0x0 | 0x140017150 | 0x22b70 | 0x21570 | 0x418 |
RtlLookupFunctionEntry | 0x0 | 0x140017158 | 0x22b78 | 0x21578 | 0x41f |
RtlVirtualUnwind | 0x0 | 0x140017160 | 0x22b80 | 0x21580 | 0x426 |
UnhandledExceptionFilter | 0x0 | 0x140017168 | 0x22b88 | 0x21588 | 0x4e2 |
SetUnhandledExceptionFilter | 0x0 | 0x140017170 | 0x22b90 | 0x21590 | 0x4b3 |
TerminateProcess | 0x0 | 0x140017178 | 0x22b98 | 0x21598 | 0x4ce |
IsProcessorFeaturePresent | 0x0 | 0x140017180 | 0x22ba0 | 0x215a0 | 0x306 |
QueryPerformanceCounter | 0x0 | 0x140017188 | 0x22ba8 | 0x215a8 | 0x3a9 |
GetCurrentProcessId | 0x0 | 0x140017190 | 0x22bb0 | 0x215b0 | 0x1c7 |
GetCurrentThreadId | 0x0 | 0x140017198 | 0x22bb8 | 0x215b8 | 0x1cb |
GetSystemTimeAsFileTime | 0x0 | 0x1400171a0 | 0x22bc0 | 0x215c0 | 0x280 |
InitializeSListHead | 0x0 | 0x1400171a8 | 0x22bc8 | 0x215c8 | 0x2ef |
IsDebuggerPresent | 0x0 | 0x1400171b0 | 0x22bd0 | 0x215d0 | 0x302 |
GetStartupInfoW | 0x0 | 0x1400171b8 | 0x22bd8 | 0x215d8 | 0x26a |
GetModuleHandleW | 0x0 | 0x1400171c0 | 0x22be0 | 0x215e0 | 0x21e |
RtlUnwindEx | 0x0 | 0x1400171c8 | 0x22be8 | 0x215e8 | 0x425 |
RaiseException | 0x0 | 0x1400171d0 | 0x22bf0 | 0x215f0 | 0x3b4 |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x1400171d8 | 0x22bf8 | 0x215f8 | 0x2eb |
TlsAlloc | 0x0 | 0x1400171e0 | 0x22c00 | 0x21600 | 0x4d3 |
TlsGetValue | 0x0 | 0x1400171e8 | 0x22c08 | 0x21608 | 0x4d5 |
TlsSetValue | 0x0 | 0x1400171f0 | 0x22c10 | 0x21610 | 0x4d6 |
TlsFree | 0x0 | 0x1400171f8 | 0x22c18 | 0x21618 | 0x4d4 |
LoadLibraryExW | 0x0 | 0x140017200 | 0x22c20 | 0x21620 | 0x340 |
EnterCriticalSection | 0x0 | 0x140017208 | 0x22c28 | 0x21628 | 0xf2 |
LeaveCriticalSection | 0x0 | 0x140017210 | 0x22c30 | 0x21630 | 0x33b |
DeleteCriticalSection | 0x0 | 0x140017218 | 0x22c38 | 0x21638 | 0xd2 |
ExitProcess | 0x0 | 0x140017220 | 0x22c40 | 0x21640 | 0x11f |
GetModuleHandleExW | 0x0 | 0x140017228 | 0x22c48 | 0x21648 | 0x21d |
GetStdHandle | 0x0 | 0x140017230 | 0x22c50 | 0x21650 | 0x26b |
WriteFile | 0x0 | 0x140017238 | 0x22c58 | 0x21658 | 0x534 |
GetModuleFileNameA | 0x0 | 0x140017240 | 0x22c60 | 0x21660 | 0x219 |
MultiByteToWideChar | 0x0 | 0x140017248 | 0x22c68 | 0x21668 | 0x369 |
WideCharToMultiByte | 0x0 | 0x140017250 | 0x22c70 | 0x21670 | 0x520 |
GetACP | 0x0 | 0x140017258 | 0x22c78 | 0x21678 | 0x16e |
LCMapStringW | 0x0 | 0x140017260 | 0x22c80 | 0x21680 | 0x32f |
GetFileType | 0x0 | 0x140017268 | 0x22c88 | 0x21688 | 0x1fa |
FindClose | 0x0 | 0x140017270 | 0x22c90 | 0x21690 | 0x134 |
FindFirstFileExA | 0x0 | 0x140017278 | 0x22c98 | 0x21698 | 0x139 |
FindNextFileA | 0x0 | 0x140017280 | 0x22ca0 | 0x216a0 | 0x149 |
IsValidCodePage | 0x0 | 0x140017288 | 0x22ca8 | 0x216a8 | 0x30c |
GetOEMCP | 0x0 | 0x140017290 | 0x22cb0 | 0x216b0 | 0x23e |
GetCPInfo | 0x0 | 0x140017298 | 0x22cb8 | 0x216b8 | 0x178 |
GetCommandLineA | 0x0 | 0x1400172a0 | 0x22cc0 | 0x216c0 | 0x18c |
GetEnvironmentStringsW | 0x0 | 0x1400172a8 | 0x22cc8 | 0x216c8 | 0x1e1 |
FreeEnvironmentStringsW | 0x0 | 0x1400172b0 | 0x22cd0 | 0x216d0 | 0x167 |
SetStdHandle | 0x0 | 0x1400172b8 | 0x22cd8 | 0x216d8 | 0x494 |
GetStringTypeW | 0x0 | 0x1400172c0 | 0x22ce0 | 0x216e0 | 0x270 |
FlushFileBuffers | 0x0 | 0x1400172c8 | 0x22ce8 | 0x216e8 | 0x15d |
GetConsoleCP | 0x0 | 0x1400172d0 | 0x22cf0 | 0x216f0 | 0x1a0 |
GetConsoleMode | 0x0 | 0x1400172d8 | 0x22cf8 | 0x216f8 | 0x1b2 |
WriteProcessMemory | 0x0 | 0x1400172e0 | 0x22d00 | 0x21700 | 0x53d |
ADVAPI32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SystemFunction036 | 0x0 | 0x140017000 | 0x22a20 | 0x21420 | 0x2f1 |
LookupPrivilegeValueW | 0x0 | 0x140017008 | 0x22a28 | 0x21428 | 0x197 |
AdjustTokenPrivileges | 0x0 | 0x140017010 | 0x22a30 | 0x21430 | 0x1f |
ImpersonateSelf | 0x0 | 0x140017018 | 0x22a38 | 0x21438 | 0x175 |
OpenProcessToken | 0x0 | 0x140017020 | 0x22a40 | 0x21440 | 0x1f7 |
OpenThreadToken | 0x0 | 0x140017028 | 0x22a48 | 0x21448 | 0x1fc |
LookupAccountSidW | 0x0 | 0x140017030 | 0x22a50 | 0x21450 | 0x191 |
GetTokenInformation | 0x0 | 0x140017038 | 0x22a58 | 0x21458 | 0x15a |
SHELL32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CommandLineToArgvW | 0x0 | 0x1400172f0 | 0x22d10 | 0x21710 | 0x6 |
ShellExecuteW | 0x0 | 0x1400172f8 | 0x22d18 | 0x21718 | 0x122 |
Memory Dumps (1)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuilds | Bitness | Entry Points | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
dfylx.exe | 1 | 0x7FF7F2C60000 | 0x7FF7F2FEDFFF | Relevant Image | - | 64-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Trojan.Ransom.Ryuk.B |
Malicious
|
C:\$GetCurrent\SafeOS\preoobe.cmd | Modified File | Unknown |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1025\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1029\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1028\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1031\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1040\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1038\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1037\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1053\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\2070\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\Rotate2.ico | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\DHtmlHeader.html | Modified File | Text |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\Save.ico | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\SysReqMet.ico | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\ParameterInfo.xml | Modified File | Binary |
Unknown
|
...
|
»
C:\588bce7c90097ed212\RGB9Rast_x86.msi | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\SetupUi.xsd | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\watermark.bmp | Modified File | Stream |
Unknown
|
...
|
»
C:\$GetCurrent\Logs\oobe_2017_09_07_03_08_57_737.log | Modified File | Stream |
Not Queried
|
...
|
»
C:\$GetCurrent\SafeOS\PartnerSetupComplete.cmd | Modified File | Unknown |
Not Queried
|
...
|
»
C:\$GetCurrent\SafeOS\SetupComplete.cmd | Modified File | Unknown |
Not Queried
|
...
|
»
C:\$GetCurrent\Logs\downlevel_2017_09_07_02_02_39_766.log | Modified File | Stream |
Not Queried
|
...
|
»
C:\$GetCurrent\Logs\PartnerSetupCompleteResult.log | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1025\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1028\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1029\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1030\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1031\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1030\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1032\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1032\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1035\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1033\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1036\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1033\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1038\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1037\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1036\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1035\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1040\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1041\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1041\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1043\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1042\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1042\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1044\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1044\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1043\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1045\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1046\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1046\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1045\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1049\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1049\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1053\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1055\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1055\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\2052\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\3076\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\3082\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\2052\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\3076\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\2070\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\3082\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Client\Parameterinfo.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Graphics\Print.ico | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Graphics\Rotate1.ico | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Extended\Parameterinfo.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Client\UiInfo.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\DisplayIcon.ico | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Extended\UiInfo.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Graphics\Rotate3.ico | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Graphics\Rotate5.ico | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Graphics\Rotate6.ico | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Graphics\Rotate4.ico | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Graphics\Rotate7.ico | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Graphics\SysReqNotMet.ico | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Graphics\Rotate8.ico | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Graphics\Setup.ico | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\header.bmp | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Graphics\stop.ico | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Graphics\warn.ico | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\netfx_Core_x86.msi | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\netfx_Extended_x64.msi | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\netfx_Extended_x86.msi | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Strings.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\RGB9RAST_x64.msi | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\SplashScreen.bmp | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\UiInfo.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\netfx_Core_x64.msi | Modified File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Client-Licensing-Platform%4Admin.evtx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Logs\HardwareEvents.evtx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Logs\Key Management Service.evtx | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\netfx_Extended.mzz | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\netfx_Core.mzz | Modified File | Stream |
Not Queried
|
...
|
»
c:\programdata\microsoft\crypto\rsa\machinekeys\08e575673cce10c72090304839888e02_33d770d0-06bc-47c5-8714-222cdac43a71 | Dropped File | Stream |
Not Queried
|
...
|
»