VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Ransomware
Pua
|
Threat Names: |
Gen:Variant.Bulz.232846
Mal/Generic-S
|
aes.exe
Windows Exe (x86-64)
Created at 2020-12-10T16:55:00
Remarks
(0x0200001D): The maximum number of extracted files was exceeded. Some files may be missing in the report.
(0x0200001B): The maximum number of file reputation requests per analysis (150) was exceeded.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
File Reputation Information
»
Severity |
Suspicious
|
Names | Mal/Generic-S |
Families | - |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4674a0 |
Size Of Code | 0x111200 |
Size Of Initialized Data | 0x1ae00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_cui |
Machine Type | MachineType.amd64 |
Compile Timestamp | 1970-01-01 00:00:00+00:00 |
Sections (15)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x1110c5 | 0x111200 | 0x600 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.94 |
.rdata | 0x513000 | 0xee3a9 | 0xee400 | 0x111800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.21 |
.data | 0x602000 | 0x51b88 | 0x1ae00 | 0x1ffc00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.61 |
/4 | 0x654000 | 0x119 | 0x200 | 0x21aa00 | IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 4.83 |
/19 | 0x655000 | 0x29f11 | 0x2a000 | 0x21ac00 | IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 8.0 |
/32 | 0x67f000 | 0x929d | 0x9400 | 0x244c00 | IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.92 |
/46 | 0x689000 | 0x26a9 | 0x2800 | 0x24e000 | IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
/63 | 0x68c000 | 0x455b | 0x4600 | 0x250800 | IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.97 |
/80 | 0x691000 | 0x22 | 0x200 | 0x254e00 | IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.61 |
/99 | 0x692000 | 0x44e2a | 0x45000 | 0x255000 | IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 8.0 |
/112 | 0x6d7000 | 0x27b46 | 0x27c00 | 0x29a000 | IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.99 |
/124 | 0x6ff000 | 0xd996 | 0xda00 | 0x2c1c00 | IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.8 |
.idata | 0x70d000 | 0x4a0 | 0x600 | 0x2cf600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.69 |
.reloc | 0x70e000 | 0xa46a | 0xa600 | 0x2cfc00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 5.44 |
.symtab | 0x719000 | 0x2b8a6 | 0x2ba00 | 0x2da200 | IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 5.34 |
Imports (1)
»
kernel32.dll (40)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x602020 | 0x30d358 | 0x2cf958 | 0x0 |
WriteConsoleW | 0x0 | 0x602028 | 0x30d360 | 0x2cf960 | 0x0 |
WaitForMultipleObjects | 0x0 | 0x602030 | 0x30d368 | 0x2cf968 | 0x0 |
WaitForSingleObject | 0x0 | 0x602038 | 0x30d370 | 0x2cf970 | 0x0 |
VirtualQuery | 0x0 | 0x602040 | 0x30d378 | 0x2cf978 | 0x0 |
VirtualFree | 0x0 | 0x602048 | 0x30d380 | 0x2cf980 | 0x0 |
VirtualAlloc | 0x0 | 0x602050 | 0x30d388 | 0x2cf988 | 0x0 |
SwitchToThread | 0x0 | 0x602058 | 0x30d390 | 0x2cf990 | 0x0 |
SuspendThread | 0x0 | 0x602060 | 0x30d398 | 0x2cf998 | 0x0 |
SetWaitableTimer | 0x0 | 0x602068 | 0x30d3a0 | 0x2cf9a0 | 0x0 |
SetUnhandledExceptionFilter | 0x0 | 0x602070 | 0x30d3a8 | 0x2cf9a8 | 0x0 |
SetProcessPriorityBoost | 0x0 | 0x602078 | 0x30d3b0 | 0x2cf9b0 | 0x0 |
SetEvent | 0x0 | 0x602080 | 0x30d3b8 | 0x2cf9b8 | 0x0 |
SetErrorMode | 0x0 | 0x602088 | 0x30d3c0 | 0x2cf9c0 | 0x0 |
SetConsoleCtrlHandler | 0x0 | 0x602090 | 0x30d3c8 | 0x2cf9c8 | 0x0 |
ResumeThread | 0x0 | 0x602098 | 0x30d3d0 | 0x2cf9d0 | 0x0 |
QueryFullProcessImageNameA | 0x0 | 0x6020a0 | 0x30d3d8 | 0x2cf9d8 | 0x0 |
ProcessIdToSessionId | 0x0 | 0x6020a8 | 0x30d3e0 | 0x2cf9e0 | 0x0 |
PostQueuedCompletionStatus | 0x0 | 0x6020b0 | 0x30d3e8 | 0x2cf9e8 | 0x0 |
OpenProcess | 0x0 | 0x6020b8 | 0x30d3f0 | 0x2cf9f0 | 0x0 |
LoadLibraryA | 0x0 | 0x6020c0 | 0x30d3f8 | 0x2cf9f8 | 0x0 |
LoadLibraryW | 0x0 | 0x6020c8 | 0x30d400 | 0x2cfa00 | 0x0 |
SetThreadContext | 0x0 | 0x6020d0 | 0x30d408 | 0x2cfa08 | 0x0 |
GetThreadContext | 0x0 | 0x6020d8 | 0x30d410 | 0x2cfa10 | 0x0 |
GetSystemInfo | 0x0 | 0x6020e0 | 0x30d418 | 0x2cfa18 | 0x0 |
GetSystemDirectoryA | 0x0 | 0x6020e8 | 0x30d420 | 0x2cfa20 | 0x0 |
GetStdHandle | 0x0 | 0x6020f0 | 0x30d428 | 0x2cfa28 | 0x0 |
GetQueuedCompletionStatusEx | 0x0 | 0x6020f8 | 0x30d430 | 0x2cfa30 | 0x0 |
GetProcessAffinityMask | 0x0 | 0x602100 | 0x30d438 | 0x2cfa38 | 0x0 |
GetProcAddress | 0x0 | 0x602108 | 0x30d440 | 0x2cfa40 | 0x0 |
GetEnvironmentStringsW | 0x0 | 0x602110 | 0x30d448 | 0x2cfa48 | 0x0 |
GetConsoleMode | 0x0 | 0x602118 | 0x30d450 | 0x2cfa50 | 0x0 |
FreeEnvironmentStringsW | 0x0 | 0x602120 | 0x30d458 | 0x2cfa58 | 0x0 |
ExitProcess | 0x0 | 0x602128 | 0x30d460 | 0x2cfa60 | 0x0 |
DuplicateHandle | 0x0 | 0x602130 | 0x30d468 | 0x2cfa68 | 0x0 |
CreateThread | 0x0 | 0x602138 | 0x30d470 | 0x2cfa70 | 0x0 |
CreateIoCompletionPort | 0x0 | 0x602140 | 0x30d478 | 0x2cfa78 | 0x0 |
CreateEventA | 0x0 | 0x602148 | 0x30d480 | 0x2cfa80 | 0x0 |
CloseHandle | 0x0 | 0x602150 | 0x30d488 | 0x2cfa88 | 0x0 |
AddVectoredExceptionHandler | 0x0 | 0x602158 | 0x30d490 | 0x2cfa90 | 0x0 |
Digital Signatures (2)
»
Certificate: POKEROWA STRUNA SP Z O O
»
Issued by | POKEROWA STRUNA SP Z O O |
Parent Certificate | Sectigo RSA Code Signing CA |
Country Name | PL |
Valid From | 2020-11-23 00:00:00+00:00 |
Valid Until | 2021-11-23 23:59:59+00:00 |
Algorithm | sha256_rsa |
Serial Number | C6 50 AE 53 11 00 A9 13 89 A7 F0 30 22 8B 30 95 |
Thumbprint | 05 EE BF EC 56 8A BC 5F C4 B2 FD 9E 5E CA 08 7B 02 E4 9F 53 |
Certificate: Sectigo RSA Code Signing CA
»
Issued by | Sectigo RSA Code Signing CA |
Country Name | GB |
Valid From | 2018-11-02 00:00:00+00:00 |
Valid Until | 2030-12-31 23:59:59+00:00 |
Algorithm | sha384_rsa |
Serial Number | 1D A2 48 30 6F 9B 26 18 D0 82 E0 96 7D 33 D3 6A |
Thumbprint | 94 C9 5D A1 E8 50 BD 85 20 9A 4A 2A F3 E1 FB 16 04 F9 BB 66 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
aes.exe | 1 | 0x00820000 | 0x00B64FFF | Relevant Image |
![]() |
64-bit | 0x0085A7C0 |
![]() |
![]() |
...
|
aes.exe | 1 | 0x00820000 | 0x00B64FFF | Process Termination |
![]() |
64-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.Bulz.232846 |
Malicious
|
C:\$GetCurrent\Logs\downlevel_2017_09_07_02_02_39_766.log.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\$GetCurrent\SafeOS\PartnerSetupComplete.cmd | Modified File | Batch |
Unknown
|
...
|
»
C:\$GetCurrent\SafeOS\SetupComplete.cmd.INFECTION | Dropped File | Batch |
Unknown
|
...
|
»
C:\$GetCurrent\SafeOS\preoobe.cmd.INFECTION | Dropped File | Batch |
Unknown
|
...
|
»
C:\$Recycle.Bin\S-1-5-18\desktop.ini.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\$Recycle.Bin\S-1-5-21-1051304884-625712362-2192934891-1000\desktop.ini.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1025\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1025\eula.rtf.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1029\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1029\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1031\LocalizedData.xml.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1032\LocalizedData.xml.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1032\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1033\LocalizedData.xml.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1035\LocalizedData.xml.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1036\LocalizedData.xml.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1036\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1038\LocalizedData.xml.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1038\eula.rtf.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1040\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1040\eula.rtf.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1041\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1043\LocalizedData.xml.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1043\eula.rtf.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1044\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1045\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1045\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1046\LocalizedData.xml.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1046\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\1055\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\2052\LocalizedData.xml.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\2052\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\2070\LocalizedData.xml.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\2070\eula.rtf.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\3076\LocalizedData.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\3076\eula.rtf | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\3082\LocalizedData.xml.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\3082\eula.rtf.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Client\Parameterinfo.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Client\UiInfo.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\DHtmlHeader.html | Modified File | Text |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Extended\Parameterinfo.xml | Modified File | Binary |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Extended\UiInfo.xml.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\Print.ico | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\Rotate1.ico | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\Rotate3.ico.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\Rotate4.ico.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\Rotate5.ico | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\Rotate6.ico.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\Rotate7.ico | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\Rotate8.ico | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\Save.ico | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\Setup.ico | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\SysReqMet.ico.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\SysReqNotMet.ico.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\stop.ico.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Graphics\warn.ico | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\ParameterInfo.xml.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\RGB9Rast_x86.msi.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\SetupUi.xsd.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\SplashScreen.bmp | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Strings.xml.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Windows6.0-KB956250-v6001-x64.msu.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\header.bmp.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\netfx_Core.mzz | Modified File | Compressed |
Unknown
|
...
|
»
C:\588bce7c90097ed212\netfx_Core_x64.msi | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\netfx_Core_x86.msi | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\netfx_Extended_x64.msi | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\netfx_Extended_x86.msi | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\watermark.bmp | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\HardwareEvents.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Client-Licensing-Platform%4Admin.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-AppLocker%4EXE and DLL.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-AppLocker%4Packaged app-Deployment.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-AppLocker%4Packaged app-Execution.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-AppModel-Runtime%4Admin.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-AppReadiness%4Admin.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-AppXDeployment%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-AppXDeploymentServer%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Application-Experience%4Program-Compatibility-Assistant.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-AppxPackaging%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-BackgroundTaskInfrastructure%4Operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Bits-Client%4Operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-CoreSystem-SmsRouter-Events%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Crypto-DPAPI%4BackUpKeySvc.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Crypto-DPAPI%4Operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider%4Admin.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-DeviceSetupManager%4Admin.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-DeviceSetupManager%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Dhcpv6-Client%4Admin.evtx | Modified File | Audio |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Diagnosis-DPS%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-International%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Kernel-Boot%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Kernel-PnP%4Configuration.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Kernel-Power%4Thermal-Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Kernel-ShimEngine%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Kernel-StoreMgr%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Kernel-WHEA%4Errors.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Kernel-WHEA%4Operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Known Folders API Service.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-MUI%4Admin.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-MUI%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-NCSI%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-NetworkProfile%4Operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Ntfs%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Program-Compatibility-Assistant%4CompatAfterUpgrade.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-ReadyBoost%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Resource-Exhaustion-Detector%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-SMBServer%4Audit.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-SMBServer%4Connectivity.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-SMBServer%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-SMBServer%4Security.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-SettingSync%4Debug.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-SettingSync%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Shell-Core%4ActionCenter.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Shell-Core%4Operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-SmbClient%4Connectivity.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-SmbClient%4Security.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Store%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-TWinUI%4Operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-TerminalServices-LocalSessionManager%4Admin.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-TerminalServices-RemoteConnectionManager%4Admin.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-TerminalServices-RemoteConnectionManager%4Operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-User Profile Service%4Operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-UserPnp%4ActionCenter.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-UserPnp%4DeviceInstall.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-VolumeSnapshot-Driver%4Operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-WMI-Activity%4Operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Wcmsvc%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-WinINet-Config%4ProxyConfigChanged.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Windows Defender%4WHC.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Windows Firewall With Advanced Security%4Firewall.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Microsoft-Windows-Winlogon%4Operational.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Windows PowerShell.evtx.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\0D0D4EEB-DC03-4B3F-88DF-959FE1EDE5F4\en-us.16\s641033.hash.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\0D0D4EEB-DC03-4B3F-88DF-959FE1EDE5F4\x-none.16\s640.hash.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\0D0D4EEB-DC03-4B3F-88DF-959FE1EDE5F4\x-none.16\stream.x64.x-none.man.dat | Modified File | Stream |
Unknown
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\19B11135-37BD-4FA1-A78E-C20CA2BDA1C0\en-us.16\s641033.hash | Modified File | Stream |
Unknown
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\19B11135-37BD-4FA1-A78E-C20CA2BDA1C0\en-us.16\stream.x64.en-us.man.dat | Modified File | Stream |
Unknown
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\19B11135-37BD-4FA1-A78E-C20CA2BDA1C0\x-none.16\MasterDescriptor.x-none.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\19B11135-37BD-4FA1-A78E-C20CA2BDA1C0\x-none.16\s640.hash.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\19B11135-37BD-4FA1-A78E-C20CA2BDA1C0\x-none.16\stream.x64.x-none.man.dat | Modified File | Stream |
Unknown
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\201EB7DF-C721-4B8B-9C81-A09DE7F931E6\en-us.16\s641033.hash.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\201EB7DF-C721-4B8B-9C81-A09DE7F931E6\x-none.16\MasterDescriptor.x-none.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\201EB7DF-C721-4B8B-9C81-A09DE7F931E6\x-none.16\s640.hash.INFECTION | Dropped File | Stream |
Unknown
|
...
|
»
C:\$GetCurrent\Logs\PartnerSetupCompleteResult.log.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\$GetCurrent\Logs\oobe_2017_09_07_03_08_57_737.log.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\$GetCurrent\SafeOS\GetCurrentRollback.ini.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1028\LocalizedData.xml.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1028\eula.rtf.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1030\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1030\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1031\eula.rtf.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1033\eula.rtf.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1035\eula.rtf.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1037\LocalizedData.xml.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1037\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1041\eula.rtf.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1042\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1042\eula.rtf.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1044\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1049\LocalizedData.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1049\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1053\LocalizedData.xml.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1053\eula.rtf.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\1055\eula.rtf | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\DisplayIcon.ico | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Graphics\Rotate2.ico | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\RGB9RAST_x64.msi | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\UiInfo.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Windows6.0-KB956250-v6001-x86.msu.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Windows6.1-KB958488-v6001-x64.msu | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\Windows6.1-KB958488-v6001-x86.msu | Modified File | Stream |
Not Queried
|
...
|
»
C:\588bce7c90097ed212\netfx_Extended.mzz | Modified File | Stream |
Not Queried
|
...
|
»
C:\Logs\Internet Explorer.evtx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Logs\Key Management Service.evtx.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-AppLocker%4MSI and Script.evtx.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-AppReadiness%4Operational.evtx.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-AppXDeploymentServer%4Restricted.evtx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-ApplicationResourceManagementSystem%4Operational.evtx.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-CodeIntegrity%4Operational.evtx.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-Dhcp-Client%4Admin.evtx.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-Diagnostics-Performance%4Operational.evtx.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-GroupPolicy%4Operational.evtx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-HotspotAuth%4Operational.evtx.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-Hyper-V-Guest-Drivers%4Admin.evtx.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-Kernel-EventTracing%4Admin.evtx.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-LiveId%4Operational.evtx.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-Ntfs%4WHC.evtx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-SMBClient%4Operational.evtx.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-TaskScheduler%4Maintenance.evtx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-Windows Defender%4Operational.evtx | Modified File | Stream |
Not Queried
|
...
|
»
C:\Logs\Microsoft-Windows-Windows Firewall With Advanced Security%4ConnectionSecurity.evtx.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Logs\System.evtx.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\0D0D4EEB-DC03-4B3F-88DF-959FE1EDE5F4\en-us.16\MasterDescriptor.en-us.xml.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\0D0D4EEB-DC03-4B3F-88DF-959FE1EDE5F4\en-us.16\stream.x64.en-us.man.dat.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\0D0D4EEB-DC03-4B3F-88DF-959FE1EDE5F4\x-none.16\MasterDescriptor.x-none.xml.INFECTION | Dropped File | Stream |
Not Queried
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\19B11135-37BD-4FA1-A78E-C20CA2BDA1C0\en-us.16\MasterDescriptor.en-us.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\201EB7DF-C721-4B8B-9C81-A09DE7F931E6\en-us.16\MasterDescriptor.en-us.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\ProgramData\Microsoft\ClickToRun\201EB7DF-C721-4B8B-9C81-A09DE7F931E6\en-us.16\stream.x64.en-us.man.dat | Modified File | Stream |
Not Queried
|
...
|
»