VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: Ransomware, Trojan |
LithuanianicMercy.exe
Windows Exe (x86-32)
Created 6 years ago
Remarks (1/1)
(0x200000e): The overall sleep time of all monitored processes was truncated from "34 minutes, 10 seconds" to "6 minutes, 50 seconds" to reveal dormant functionality.
Remarks
(0x200001d): The maximum number of extracted files was exceeded. Some files may be missing in the report.
(0x200001b): The maximum number of file reputation requests per analysis (150) was exceeded.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Adobe\Acrobat\10.0\AdobeCMapFnt10.lst.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Adobe\Acrobat\10.0\AdobeSysFnt10.lst.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Adobe\Acrobat\10.0\Cache\AcroFnt10.lst.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Adobe\Color\Profiles\wsRGB.icc.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Adobe\Color\ACECache11.lst.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Adobe\Color\Profiles\wscRGB.icc.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Adobe\Acrobat\10.0\SharedDataEvents.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Adobe\Acrobat\10.0\UserCache.bin.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\GDIPFONTCACHEV1.DAT.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\IconCache.db.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\-3HwBD.mp3.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
c:\users\5p5nrgjn0js halpmcxz\appdata\local\temp\aap48.bmp | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
c:\users\5p5nrgjn0js halpmcxz\appdata\local\temp\adobearm.log | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\2_X5jgoo4R.mkv.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\A6-tx.png.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\5n7V_dpvFsPcfeT.jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\bhVHh9vag.ods.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\-_Abf.m4a.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\cTnz0lX0I5LRBU.avi.RYK | Modified File | Binary |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\fvKwNo.m4a.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Na5SCDqcu.avi.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\nOB_fTzWtz.jpg.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Cookies\index.dat.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\h-QRK24bUvv.avi.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Hn5mlIFREYh.mp4.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\hUd3.odt.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\m-LhGh.jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\r2tckeZpAx.gif.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\r5rh2Zj8knIy6.xlsx.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\so_icZDLdW.bmp.RYK | Modified File | Binary |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\UIfeawfrYxbuq4y.ppt.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wyUTAZSa4aslGP.bmp.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Yn6sipw.png.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\zMfZwh0M.swf.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\Low\History.IE5\index.dat.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds\FeedsStore.feedsdb-ms.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\index.dat.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\FORMS\FRMCACHE.DAT.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Internet Explorer\MSIMGSIZ.DAT.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Internet Explorer\brndlog.txt.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Internet Explorer\brndlog.bak.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\LocalMLS_3.wmdb.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Outlook\mapisvc.inf.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Outlook\Outlook.sharing.xml.obi.RYK | Dropped File | Binary |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Visio\content14.dat.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Visio\thumbs.dat.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edb.chk.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\oeold.xml.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edbres00002.jrs.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edb.log.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edbres00001.jrs.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edb00001.log.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Media\12.0\WMSDKNS.DTD.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Media\12.0\WMSDKNS.XML.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\1kUVpQ_Zt82RFCit.mp3.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\h9rGGKVu2RoTrBPAPBSt.m4a.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\History\History.IE5\index.dat.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\m PaeztPScMOCABnBw.odt.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\nzeHnkDAE XhQuVC.mkv.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\MG2ouA3smoXOczkz.m4a.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\zpVd utUwmOU7EvLSEq.mkv.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\MSIMGSIZ.DAT.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\Low\History.IE5\MSHist012017071220170713\index.dat.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds\Microsoft Feeds~\MSNBC News~.feed-ms.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Internet Explorer\DOMStore\index.dat.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Internet Explorer\frameiconcache.dat.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\CurrentDatabase_372.wmdb.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Bears.htm.RYK | Dropped File | Text |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Bears.jpg.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Garden.htm.RYK | Dropped File | Text |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Garden.jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Green Bubbles.htm.RYK | Dropped File | Text |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\GreenBubbles.jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Hand Prints.htm.RYK | Dropped File | Text |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\HandPrints.jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Backup\old\WindowsMail.pat.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Orange Circles.htm.RYK | Dropped File | Text |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\OrangeCircles.jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Peacock.htm.RYK | Modified File | Text |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Peacock.jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Roses.htm.RYK | Dropped File | Text |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Roses.jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Shades of Blue.htm.RYK | Dropped File | Text |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\ShadesOfBlue.jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Soft Blue.htm.RYK | Modified File | Text |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\SoftBlue.jpg.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Stars.htm.RYK | Modified File | Text |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Stars.jpg.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Backup\old\edb00001.log.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Temporary Internet Files\Content.IE5\index.dat.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\WindowsMail.MSMessageStore.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\js[1].RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\ABV8L7MY\v2[3].RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\ABV8L7MY\v2[2].RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\ABV8L7MY\f[1].txt.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\ABV8L7MY\v2[1].RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\ABV8L7MY\v2[4].RYK | Dropped File | Binary |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\IKQEEPZR\js[1].RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\IKQEEPZR\js[2].RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\IKQEEPZR\ga[1].js.RYK | Modified File | Text |
Malicious
|
...
|
»
YARA Matches (2)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
JS_High_Entropy | JavaScript has a high entropy; possible obfuscation | - |
4/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\index.dat.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\YG1R61Z8\js[1].RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\YG1R61Z8\js[2].RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
c:\users\5p5nrgjn0js halpmcxz\appdata\local\microsoft\windows\temporary internet files\low\content.ie5\yg1r61z8\uid[1].htm | Modified File | Text |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\YG1R61Z8\v2[1].RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds\Microsoft Feeds~\Microsoft at Home~.feed-ms.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds\Microsoft Feeds~\Microsoft at Work~.feed-ms.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\Sync Playlists\en-US\0000E713\11_All_Pictures.wpl.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\Sync Playlists\en-US\0000E713\10_All_Music.wpl.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\Sync Playlists\en-US\0000E713\12_All_Video.wpl.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\Sync Playlists\en-US\00010C6E\11_All_Pictures.wpl.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\Sync Playlists\en-US\00010C6E\12_All_Video.wpl.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\Sync Playlists\en-US\00010C6E\10_All_Music.wpl.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\ONetConfig\350db95df4cbd94b2a1c300510e12e11.xml.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\ONetConfig\350db95df4cbd94b2a1c300510e12e11.sig.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Backup\old\WindowsMail.MSMessageStore.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBC0lYn[1].jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\ie8[1].txt.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\meversion[1].RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\css[2].txt.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\AA3e3XC[2].png.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBEgyIm[1].jpg.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBEgsz3[1].jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\AA8uCo4[1].png.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\528d82a2[1].js.RYK | Modified File | Text |
Malicious
|
...
|
»
YARA Matches (2)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
JS_High_Entropy | JavaScript has a high entropy; possible obfuscation | - |
4/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\AA61yi9[1].png.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\AA3vOVA[1].png.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBBPUFJ[1].jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBBOe7C[1].jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBBO3tl[1].jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBBNiEo[1].jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBEgx5f[2].jpg.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBEgx5f[1].jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBEgtcS[2].jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBEgtcS[1].jpg.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBEgqtY[1].jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBEgJfz[1].jpg.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBEgiYw[1].jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBEgGSl[1].jpg.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBEg9QV[1].jpg.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBEfjuT[1].jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BB6Ma4a[1].png.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BB1CcOi[1].png.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\async_usersync[1].RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\advertisement.ad[1].js.RYK | Dropped File | Text |
Malicious
|
...
|
»
YARA Matches (2)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
JS_High_Entropy | JavaScript has a high entropy; possible obfuscation | - |
4/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\28-8f3193-f30905ea[1].RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBBQxzx[1].jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBBPThN[1].jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBBO8dQ[1].jpg.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBBO1mQ[1].jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\f8-028d9f-f30905ea[1].RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\ContainerTag[2].js.RYK | Modified File | Text |
Malicious
|
...
|
»
YARA Matches (2)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
JS_High_Entropy | JavaScript has a high entropy; possible obfuscation | - |
4/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBz3ebk[1].png.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBnMKeN[1].png.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBn4lUU[1].png.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBiyCq[1].png.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBBLhZX[1].jpg.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBBL0ij[1].jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BB74fLs[1].png.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BBBIqq8[1].jpg.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BB5kTiV[1].png.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BB5kJAC[1].png.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\BB46JmN[1].png.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\async_usersync[3].RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\adServer[1].htm.RYK | Modified File | Text |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\fallback_728x90[1].jpg.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\AAdAVrM[1].png.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\ContainerTag[1].js.RYK | Modified File | Text |
Malicious
|
...
|
»
YARA Matches (2)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
JS_High_Entropy | JavaScript has a high entropy; possible obfuscation | - |
4/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\9QH4S0GZ\chrome-new[1].jpg.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\ABV8L7MY\core[1].css.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\ABV8L7MY\Standard[1].RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\ABV8L7MY\print[1].txt.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\ABV8L7MY\index[1].htm.RYK | Modified File | Text |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\IKQEEPZR\ast[2].js.RYK | Modified File | Text |
Malicious
|
...
|
»
YARA Matches (2)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
JS_High_Entropy | JavaScript has a high entropy; possible obfuscation | - |
4/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\IKQEEPZR\adfserve[1].RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\IKQEEPZR\adfscript[1].RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\YG1R61Z8\adex[1].js.RYK | Modified File | Text |
Malicious
|
...
|
»
YARA Matches (2)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
JS_High_Entropy | JavaScript has a high entropy; possible obfuscation | - |
4/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\IKQEEPZR\player[1].js.RYK | Modified File | Text |
Malicious
|
...
|
»
YARA Matches (2)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
JS_High_Entropy | JavaScript has a high entropy; possible obfuscation | - |
4/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\IKQEEPZR\player[2].js.RYK | Modified File | Text |
Malicious
|
...
|
»
YARA Matches (2)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
JS_High_Entropy | JavaScript has a high entropy; possible obfuscation | - |
4/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\IKQEEPZR\th[1].jpg.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\YG1R61Z8\adfscript[1].RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\YG1R61Z8\ast[1].js.RYK | Modified File | Text |
Malicious
|
...
|
»
YARA Matches (2)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
JS_High_Entropy | JavaScript has a high entropy; possible obfuscation | - |
4/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\YG1R61Z8\26158[1].png.RYK | Modified File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\YG1R61Z8\msn[1].htm.RYK | Dropped File | Text |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Low\Content.IE5\YG1R61Z8\css[1].txt.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\account{047EF9CE-9C1F-4250-9CA7-D206DB8B643C}.oeaccount.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\account{1CD43F3B-668B-4CA8-B816-34F74122EC0F}.oeaccount.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Documents and Settings\5p5NrGJn0jS HALPmcxz\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\account{AF0DB737-2EF9-4633-BF5E-1A6761ED1577}.oeaccount.RYK | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
HermesRyukEncryptedFile | File encrypted by Hermes or Ryuk Ransomware | Ransomware |
5/5
|
...
|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\LithuanianicMercy.exe | Sample File | Binary |
Blacklisted
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2019-09-03 15:38 (UTC+2) |
Last Seen | 2019-09-04 16:36 (UTC+2) |
Names | Win32.Trojan.Kryptik |
Families | Kryptik |
Classification | Trojan |
PE Information
»
Image Base | 0x30000000 |
Entry Point | 0x30043a6d |
Size Of Code | 0x6a600 |
Size Of Initialized Data | 0xc2600 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2019-09-02 23:33:55+00:00 |
Version Information (10)
»
Comments | 3u Streets Weekly |
CompanyName | ooVoo LLC |
FileDescription | 3u Streets Weekly |
FileVersion | 7.4.2.2 |
InternalName | LithuanianicMercy |
LegalCopyright | Copyright ©. 1999 - 2014 ooVoo LLC |
LegalTrademarks | Copyright ©. 1999 - 2014 ooVoo LLC |
OriginalFilename | LithuanianicMercy.exe |
ProductName | LithuanianicMercy |
ProductVersion | 7.4.2.2 |
Sections (6)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x30001000 | 0x6a531 | 0x6a600 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.41 |
.rdata | 0x3006c000 | 0x281a6 | 0x28200 | 0x6aa00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.87 |
.data | 0x30095000 | 0x46b4 | 0x2c00 | 0x92c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 6.62 |
.gfids | 0x3009a000 | 0x1a4 | 0x200 | 0x95800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 2.15 |
.tls | 0x3009b000 | 0x9 | 0x200 | 0x95a00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.02 |
.rsrc | 0x3009c000 | 0x2963f8 | 0x97400 | 0x95c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.1 |
Imports (21)
»
KERNEL32.dll (111)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CreateMutexA | 0x0 | 0x3006c090 | 0x92a14 | 0x91414 | 0xd7 |
LoadLibraryA | 0x0 | 0x3006c094 | 0x92a18 | 0x91418 | 0x3c1 |
GetModuleFileNameW | 0x0 | 0x3006c098 | 0x92a1c | 0x9141c | 0x274 |
CreateProcessW | 0x0 | 0x3006c09c | 0x92a20 | 0x91420 | 0xe5 |
FindResourceA | 0x0 | 0x3006c0a0 | 0x92a24 | 0x91424 | 0x193 |
GetTempPathA | 0x0 | 0x3006c0a4 | 0x92a28 | 0x91428 | 0x2f5 |
CreateFileA | 0x0 | 0x3006c0a8 | 0x92a2c | 0x9142c | 0xc3 |
GetComputerNameW | 0x0 | 0x3006c0ac | 0x92a30 | 0x91430 | 0x1df |
QueryPerformanceCounter | 0x0 | 0x3006c0b0 | 0x92a34 | 0x91434 | 0x44d |
QueryPerformanceFrequency | 0x0 | 0x3006c0b4 | 0x92a38 | 0x91438 | 0x44e |
EnumDateFormatsA | 0x0 | 0x3006c0b8 | 0x92a3c | 0x9143c | 0x138 |
CreateToolhelp32Snapshot | 0x0 | 0x3006c0bc | 0x92a40 | 0x91440 | 0xfc |
WriteConsoleW | 0x0 | 0x3006c0c0 | 0x92a44 | 0x91444 | 0x611 |
ReadConsoleW | 0x0 | 0x3006c0c4 | 0x92a48 | 0x91448 | 0x470 |
HeapSize | 0x0 | 0x3006c0c8 | 0x92a4c | 0x9144c | 0x34e |
SetStdHandle | 0x0 | 0x3006c0cc | 0x92a50 | 0x91450 | 0x54a |
SetEnvironmentVariableW | 0x0 | 0x3006c0d0 | 0x92a54 | 0x91454 | 0x514 |
FreeEnvironmentStringsW | 0x0 | 0x3006c0d4 | 0x92a58 | 0x91458 | 0x1aa |
GetEnvironmentStringsW | 0x0 | 0x3006c0d8 | 0x92a5c | 0x9145c | 0x237 |
GetCommandLineW | 0x0 | 0x3006c0dc | 0x92a60 | 0x91460 | 0x1d7 |
GetCommandLineA | 0x0 | 0x3006c0e0 | 0x92a64 | 0x91464 | 0x1d6 |
GetOEMCP | 0x0 | 0x3006c0e4 | 0x92a68 | 0x91468 | 0x297 |
GetACP | 0x0 | 0x3006c0e8 | 0x92a6c | 0x9146c | 0x1b2 |
IsValidCodePage | 0x0 | 0x3006c0ec | 0x92a70 | 0x91470 | 0x38b |
FindNextFileW | 0x0 | 0x3006c0f0 | 0x92a74 | 0x91474 | 0x18c |
FindFirstFileExW | 0x0 | 0x3006c0f4 | 0x92a78 | 0x91478 | 0x17b |
FindClose | 0x0 | 0x3006c0f8 | 0x92a7c | 0x9147c | 0x175 |
SetFilePointerEx | 0x0 | 0x3006c0fc | 0x92a80 | 0x91480 | 0x523 |
GetFileSizeEx | 0x0 | 0x3006c100 | 0x92a84 | 0x91484 | 0x24c |
GetConsoleMode | 0x0 | 0x3006c104 | 0x92a88 | 0x91488 | 0x1fc |
GetConsoleCP | 0x0 | 0x3006c108 | 0x92a8c | 0x9148c | 0x1ea |
FlushFileBuffers | 0x0 | 0x3006c10c | 0x92a90 | 0x91490 | 0x19f |
EnumSystemLocalesW | 0x0 | 0x3006c110 | 0x92a94 | 0x91494 | 0x154 |
GetUserDefaultLCID | 0x0 | 0x3006c114 | 0x92a98 | 0x91498 | 0x312 |
IsValidLocale | 0x0 | 0x3006c118 | 0x92a9c | 0x9149c | 0x38d |
MulDiv | 0x0 | 0x3006c11c | 0x92aa0 | 0x914a0 | 0x3ee |
Sleep | 0x0 | 0x3006c120 | 0x92aa4 | 0x914a4 | 0x57d |
GetStdHandle | 0x0 | 0x3006c124 | 0x92aa8 | 0x914a8 | 0x2d2 |
GetModuleHandleExW | 0x0 | 0x3006c128 | 0x92aac | 0x914ac | 0x277 |
LoadLibraryExW | 0x0 | 0x3006c12c | 0x92ab0 | 0x914b0 | 0x3c3 |
FreeLibrary | 0x0 | 0x3006c130 | 0x92ab4 | 0x914b4 | 0x1ab |
RtlUnwind | 0x0 | 0x3006c134 | 0x92ab8 | 0x914b8 | 0x4d3 |
OutputDebugStringW | 0x0 | 0x3006c138 | 0x92abc | 0x914bc | 0x419 |
GetLocaleInfoW | 0x0 | 0x3006c13c | 0x92ac0 | 0x914c0 | 0x265 |
LCMapStringW | 0x0 | 0x3006c140 | 0x92ac4 | 0x914c4 | 0x3b1 |
CompareStringW | 0x0 | 0x3006c144 | 0x92ac8 | 0x914c8 | 0x9b |
TlsFree | 0x0 | 0x3006c148 | 0x92acc | 0x914cc | 0x59f |
TlsSetValue | 0x0 | 0x3006c14c | 0x92ad0 | 0x914d0 | 0x5a1 |
TlsGetValue | 0x0 | 0x3006c150 | 0x92ad4 | 0x914d4 | 0x5a0 |
TlsAlloc | 0x0 | 0x3006c154 | 0x92ad8 | 0x914d8 | 0x59e |
GetCPInfo | 0x0 | 0x3006c158 | 0x92adc | 0x914dc | 0x1c1 |
EncodePointer | 0x0 | 0x3006c15c | 0x92ae0 | 0x914e0 | 0x12d |
GetStringTypeW | 0x0 | 0x3006c160 | 0x92ae4 | 0x914e4 | 0x2d7 |
MultiByteToWideChar | 0x0 | 0x3006c164 | 0x92ae8 | 0x914e8 | 0x3ef |
WideCharToMultiByte | 0x0 | 0x3006c168 | 0x92aec | 0x914ec | 0x5fe |
InitializeSListHead | 0x0 | 0x3006c16c | 0x92af0 | 0x914f0 | 0x363 |
GetSystemTimeAsFileTime | 0x0 | 0x3006c170 | 0x92af4 | 0x914f4 | 0x2e9 |
GetCurrentThreadId | 0x0 | 0x3006c174 | 0x92af8 | 0x914f8 | 0x21c |
GetCurrentProcessId | 0x0 | 0x3006c178 | 0x92afc | 0x914fc | 0x218 |
GetStartupInfoW | 0x0 | 0x3006c17c | 0x92b00 | 0x91500 | 0x2d0 |
IsDebuggerPresent | 0x0 | 0x3006c180 | 0x92b04 | 0x91504 | 0x37f |
IsProcessorFeaturePresent | 0x0 | 0x3006c184 | 0x92b08 | 0x91508 | 0x386 |
GetCurrentProcess | 0x0 | 0x3006c188 | 0x92b0c | 0x9150c | 0x217 |
SetUnhandledExceptionFilter | 0x0 | 0x3006c18c | 0x92b10 | 0x91510 | 0x56d |
UnhandledExceptionFilter | 0x0 | 0x3006c190 | 0x92b14 | 0x91514 | 0x5ad |
CreateEventW | 0x0 | 0x3006c194 | 0x92b18 | 0x91518 | 0xbf |
WaitForSingleObjectEx | 0x0 | 0x3006c198 | 0x92b1c | 0x9151c | 0x5d8 |
ResetEvent | 0x0 | 0x3006c19c | 0x92b20 | 0x91520 | 0x4c6 |
SetEvent | 0x0 | 0x3006c1a0 | 0x92b24 | 0x91524 | 0x516 |
LeaveCriticalSection | 0x0 | 0x3006c1a4 | 0x92b28 | 0x91528 | 0x3bd |
EnterCriticalSection | 0x0 | 0x3006c1a8 | 0x92b2c | 0x9152c | 0x131 |
SizeofResource | 0x0 | 0x3006c1ac | 0x92b30 | 0x91530 | 0x57c |
OpenProcess | 0x0 | 0x3006c1b0 | 0x92b34 | 0x91534 | 0x40d |
LoadResource | 0x0 | 0x3006c1b4 | 0x92b38 | 0x91538 | 0x3c7 |
WaitForMultipleObjects | 0x0 | 0x3006c1b8 | 0x92b3c | 0x9153c | 0x5d5 |
WaitForSingleObject | 0x0 | 0x3006c1bc | 0x92b40 | 0x91540 | 0x5d7 |
LocalFree | 0x0 | 0x3006c1c0 | 0x92b44 | 0x91544 | 0x3cf |
LocalAlloc | 0x0 | 0x3006c1c4 | 0x92b48 | 0x91548 | 0x3ca |
GetProcAddress | 0x0 | 0x3006c1c8 | 0x92b4c | 0x9154c | 0x2ae |
LockResource | 0x0 | 0x3006c1cc | 0x92b50 | 0x91550 | 0x3db |
CreateDirectoryW | 0x0 | 0x3006c1d0 | 0x92b54 | 0x91554 | 0xba |
ReleaseMutex | 0x0 | 0x3006c1d4 | 0x92b58 | 0x91558 | 0x4b0 |
SetLastError | 0x0 | 0x3006c1d8 | 0x92b5c | 0x9155c | 0x532 |
CreateThread | 0x0 | 0x3006c1dc | 0x92b60 | 0x91560 | 0xf3 |
TerminateProcess | 0x0 | 0x3006c1e0 | 0x92b64 | 0x91564 | 0x58c |
HeapReAlloc | 0x0 | 0x3006c1e4 | 0x92b68 | 0x91568 | 0x34c |
ExitProcess | 0x0 | 0x3006c1e8 | 0x92b6c | 0x9156c | 0x15e |
GetTempPathW | 0x0 | 0x3006c1ec | 0x92b70 | 0x91570 | 0x2f6 |
CreateFileW | 0x0 | 0x3006c1f0 | 0x92b74 | 0x91574 | 0xcb |
ReadFile | 0x0 | 0x3006c1f4 | 0x92b78 | 0x91578 | 0x473 |
WriteFile | 0x0 | 0x3006c1f8 | 0x92b7c | 0x9157c | 0x612 |
GetFileSize | 0x0 | 0x3006c1fc | 0x92b80 | 0x91580 | 0x24b |
GetProcessHeap | 0x0 | 0x3006c200 | 0x92b84 | 0x91584 | 0x2b4 |
HeapFree | 0x0 | 0x3006c204 | 0x92b88 | 0x91588 | 0x349 |
HeapAlloc | 0x0 | 0x3006c208 | 0x92b8c | 0x9158c | 0x345 |
GlobalUnlock | 0x0 | 0x3006c20c | 0x92b90 | 0x91590 | 0x33f |
GlobalLock | 0x0 | 0x3006c210 | 0x92b94 | 0x91594 | 0x338 |
GlobalAlloc | 0x0 | 0x3006c214 | 0x92b98 | 0x91598 | 0x32d |
GetModuleHandleA | 0x0 | 0x3006c218 | 0x92b9c | 0x9159c | 0x275 |
DeleteFileW | 0x0 | 0x3006c21c | 0x92ba0 | 0x915a0 | 0x115 |
GetFileAttributesExW | 0x0 | 0x3006c220 | 0x92ba4 | 0x915a4 | 0x242 |
GetTempFileNameW | 0x0 | 0x3006c224 | 0x92ba8 | 0x915a8 | 0x2f4 |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x3006c228 | 0x92bac | 0x915ac | 0x35f |
GetModuleHandleW | 0x0 | 0x3006c22c | 0x92bb0 | 0x915b0 | 0x278 |
CloseHandle | 0x0 | 0x3006c230 | 0x92bb4 | 0x915b4 | 0x86 |
DeleteCriticalSection | 0x0 | 0x3006c234 | 0x92bb8 | 0x915b8 | 0x110 |
GetLastError | 0x0 | 0x3006c238 | 0x92bbc | 0x915bc | 0x261 |
RaiseException | 0x0 | 0x3006c23c | 0x92bc0 | 0x915c0 | 0x462 |
DecodePointer | 0x0 | 0x3006c240 | 0x92bc4 | 0x915c4 | 0x109 |
GetFileType | 0x0 | 0x3006c244 | 0x92bc8 | 0x915c8 | 0x24e |
SetEndOfFile | 0x0 | 0x3006c248 | 0x92bcc | 0x915cc | 0x510 |
USER32.dll (66)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
PostMessageW | 0x0 | 0x3006c2e0 | 0x92c64 | 0x91664 | 0x2b3 |
PostQuitMessage | 0x0 | 0x3006c2e4 | 0x92c68 | 0x91668 | 0x2b4 |
SetWindowPos | 0x0 | 0x3006c2e8 | 0x92c6c | 0x9166c | 0x376 |
GetWindowTextW | 0x0 | 0x3006c2ec | 0x92c70 | 0x91670 | 0x1ed |
GetMenu | 0x0 | 0x3006c2f0 | 0x92c74 | 0x91674 | 0x172 |
EnableMenuItem | 0x0 | 0x3006c2f4 | 0x92c78 | 0x91678 | 0xe8 |
GetSubMenu | 0x0 | 0x3006c2f8 | 0x92c7c | 0x9167c | 0x1ba |
OpenClipboard | 0x0 | 0x3006c2fc | 0x92c80 | 0x91680 | 0x2a1 |
CloseClipboard | 0x0 | 0x3006c300 | 0x92c84 | 0x91684 | 0x4e |
SetClipboardData | 0x0 | 0x3006c304 | 0x92c88 | 0x91688 | 0x323 |
EndDialog | 0x0 | 0x3006c308 | 0x92c8c | 0x9168c | 0xf1 |
SetWindowLongW | 0x0 | 0x3006c30c | 0x92c90 | 0x91690 | 0x374 |
MessageBoxW | 0x0 | 0x3006c310 | 0x92c94 | 0x91694 | 0x290 |
DialogBoxParamW | 0x0 | 0x3006c314 | 0x92c98 | 0x91698 | 0xb9 |
GetParent | 0x0 | 0x3006c318 | 0x92c9c | 0x9169c | 0x18b |
GetWindowLongW | 0x0 | 0x3006c31c | 0x92ca0 | 0x916a0 | 0x1df |
SetWindowTextW | 0x0 | 0x3006c320 | 0x92ca4 | 0x916a4 | 0x37b |
EnableWindow | 0x0 | 0x3006c324 | 0x92ca8 | 0x916a8 | 0xee |
SetFocus | 0x0 | 0x3006c328 | 0x92cac | 0x916ac | 0x336 |
EmptyClipboard | 0x0 | 0x3006c32c | 0x92cb0 | 0x916b0 | 0xe7 |
InsertMenuItemW | 0x0 | 0x3006c330 | 0x92cb4 | 0x916b4 | 0x212 |
DestroyWindow | 0x0 | 0x3006c334 | 0x92cb8 | 0x916b8 | 0xb4 |
wsprintfW | 0x0 | 0x3006c338 | 0x92cbc | 0x916bc | 0x3e4 |
ClientToScreen | 0x0 | 0x3006c33c | 0x92cc0 | 0x916c0 | 0x4c |
GetKeyState | 0x0 | 0x3006c340 | 0x92cc4 | 0x916c4 | 0x163 |
SetWindowsHookExW | 0x0 | 0x3006c344 | 0x92cc8 | 0x916c8 | 0x37f |
GetMenuItemCount | 0x0 | 0x3006c348 | 0x92ccc | 0x916cc | 0x178 |
DeleteMenu | 0x0 | 0x3006c34c | 0x92cd0 | 0x916d0 | 0xaa |
GetDlgItem | 0x0 | 0x3006c350 | 0x92cd4 | 0x916d4 | 0x149 |
CallWindowProcW | 0x0 | 0x3006c354 | 0x92cd8 | 0x916d8 | 0x20 |
CreateDialogParamW | 0x0 | 0x3006c358 | 0x92cdc | 0x916dc | 0x69 |
SendMessageW | 0x0 | 0x3006c35c | 0x92ce0 | 0x916e0 | 0x319 |
TrackPopupMenuEx | 0x0 | 0x3006c360 | 0x92ce4 | 0x916e4 | 0x3a2 |
UnhookWindowsHookEx | 0x0 | 0x3006c364 | 0x92ce8 | 0x916e8 | 0x3ac |
GetWindowRect | 0x0 | 0x3006c368 | 0x92cec | 0x916ec | 0x1e6 |
GetWindowTextLengthW | 0x0 | 0x3006c36c | 0x92cf0 | 0x916f0 | 0x1ec |
SetClassLongA | 0x0 | 0x3006c370 | 0x92cf4 | 0x916f4 | 0x320 |
GetClassLongA | 0x0 | 0x3006c374 | 0x92cf8 | 0x916f8 | 0x12b |
InflateRect | 0x0 | 0x3006c378 | 0x92cfc | 0x916fc | 0x200 |
SetRect | 0x0 | 0x3006c37c | 0x92d00 | 0x91700 | 0x357 |
MessageBoxA | 0x0 | 0x3006c380 | 0x92d04 | 0x91704 | 0x289 |
GetScrollRange | 0x0 | 0x3006c384 | 0x92d08 | 0x91708 | 0x1b6 |
GetScrollPos | 0x0 | 0x3006c388 | 0x92d0c | 0x9170c | 0x1b5 |
DefDlgProcA | 0x0 | 0x3006c38c | 0x92d10 | 0x91710 | 0x9e |
SendDlgItemMessageA | 0x0 | 0x3006c390 | 0x92d14 | 0x91714 | 0x30f |
CreateWindowExA | 0x0 | 0x3006c394 | 0x92d18 | 0x91718 | 0x74 |
SendMessageA | 0x0 | 0x3006c398 | 0x92d1c | 0x9171c | 0x314 |
wsprintfA | 0x0 | 0x3006c39c | 0x92d20 | 0x91720 | 0x3e3 |
GetTopWindow | 0x0 | 0x3006c3a0 | 0x92d24 | 0x91724 | 0x1c9 |
KillTimer | 0x0 | 0x3006c3a4 | 0x92d28 | 0x91728 | 0x245 |
SetTimer | 0x0 | 0x3006c3a8 | 0x92d2c | 0x9172c | 0x368 |
RemoveMenu | 0x0 | 0x3006c3ac | 0x92d30 | 0x91730 | 0x302 |
DestroyMenu | 0x0 | 0x3006c3b0 | 0x92d34 | 0x91734 | 0xb1 |
CreatePopupMenu | 0x0 | 0x3006c3b4 | 0x92d38 | 0x91738 | 0x71 |
UpdateWindow | 0x0 | 0x3006c3b8 | 0x92d3c | 0x9173c | 0x3c1 |
LoadMenuW | 0x0 | 0x3006c3bc | 0x92d40 | 0x91740 | 0x259 |
TranslateAcceleratorW | 0x0 | 0x3006c3c0 | 0x92d44 | 0x91744 | 0x3a5 |
LoadAcceleratorsW | 0x0 | 0x3006c3c4 | 0x92d48 | 0x91748 | 0x247 |
ShowWindow | 0x0 | 0x3006c3c8 | 0x92d4c | 0x9174c | 0x387 |
CreateWindowExW | 0x0 | 0x3006c3cc | 0x92d50 | 0x91750 | 0x75 |
GetClassInfoW | 0x0 | 0x3006c3d0 | 0x92d54 | 0x91754 | 0x12a |
RegisterClassW | 0x0 | 0x3006c3d4 | 0x92d58 | 0x91758 | 0x2e1 |
DispatchMessageW | 0x0 | 0x3006c3d8 | 0x92d5c | 0x9175c | 0xbc |
TranslateMessage | 0x0 | 0x3006c3dc | 0x92d60 | 0x91760 | 0x3a7 |
GetMessageW | 0x0 | 0x3006c3e0 | 0x92d64 | 0x91764 | 0x184 |
CallNextHookEx | 0x0 | 0x3006c3e4 | 0x92d68 | 0x91768 | 0x1e |
GDI32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CreateFontW | 0x0 | 0x3006c084 | 0x92a08 | 0x91408 | 0x44 |
SetBkColor | 0x0 | 0x3006c088 | 0x92a0c | 0x9140c | 0x362 |
WINSPOOL.DRV (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
EnumPrintersA | 0x0 | 0x3006c400 | 0x92d84 | 0x91784 | 0x69 |
GetPrinterA | 0x0 | 0x3006c404 | 0x92d88 | 0x91788 | 0x80 |
FindFirstPrinterChangeNotification | 0x0 | 0x3006c408 | 0x92d8c | 0x9178c | 0x6d |
FindClosePrinterChangeNotification | 0x0 | 0x3006c40c | 0x92d90 | 0x91790 | 0x6c |
ClosePrinter | 0x0 | 0x3006c410 | 0x92d94 | 0x91794 | 0x1d |
EnumJobsA | 0x0 | 0x3006c414 | 0x92d98 | 0x91798 | 0x57 |
COMDLG32.dll (5)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetSaveFileNameW | 0x0 | 0x3006c06c | 0x929f0 | 0x913f0 | 0xe |
GetOpenFileNameW | 0x0 | 0x3006c070 | 0x929f4 | 0x913f4 | 0xc |
CommDlgExtendedError | 0x0 | 0x3006c074 | 0x929f8 | 0x913f8 | 0x4 |
GetOpenFileNameA | 0x0 | 0x3006c078 | 0x929fc | 0x913fc | 0xb |
ChooseColorA | 0x0 | 0x3006c07c | 0x92a00 | 0x91400 | 0x0 |
ADVAPI32.dll (24)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
AllocateAndInitializeSid | 0x0 | 0x3006c000 | 0x92984 | 0x91384 | 0x20 |
InitializeAcl | 0x0 | 0x3006c004 | 0x92988 | 0x91388 | 0x18e |
GetLengthSid | 0x0 | 0x3006c008 | 0x9298c | 0x9138c | 0x14b |
GetSidSubAuthorityCount | 0x0 | 0x3006c00c | 0x92990 | 0x91390 | 0x16d |
GetSidSubAuthority | 0x0 | 0x3006c010 | 0x92994 | 0x91394 | 0x16c |
GetSidIdentifierAuthority | 0x0 | 0x3006c014 | 0x92998 | 0x91398 | 0x16a |
InitializeSid | 0x0 | 0x3006c018 | 0x9299c | 0x9139c | 0x190 |
GetSidLengthRequired | 0x0 | 0x3006c01c | 0x929a0 | 0x913a0 | 0x16b |
EqualSid | 0x0 | 0x3006c020 | 0x929a4 | 0x913a4 | 0x11a |
GetTokenInformation | 0x0 | 0x3006c024 | 0x929a8 | 0x913a8 | 0x170 |
OpenProcessToken | 0x0 | 0x3006c028 | 0x929ac | 0x913ac | 0x215 |
ReportEventA | 0x0 | 0x3006c02c | 0x929b0 | 0x913b0 | 0x2bf |
RegisterEventSourceA | 0x0 | 0x3006c030 | 0x929b4 | 0x913b4 | 0x2ad |
DeregisterEventSource | 0x0 | 0x3006c034 | 0x929b8 | 0x913b8 | 0xed |
RegQueryValueExW | 0x0 | 0x3006c038 | 0x929bc | 0x913bc | 0x299 |
RegGetValueW | 0x0 | 0x3006c03c | 0x929c0 | 0x913c0 | 0x281 |
RegOpenKeyW | 0x0 | 0x3006c040 | 0x929c4 | 0x913c4 | 0x28f |
RegEnumValueW | 0x0 | 0x3006c044 | 0x929c8 | 0x913c8 | 0x27d |
RegCloseKey | 0x0 | 0x3006c048 | 0x929cc | 0x913cc | 0x25b |
LookupAccountSidW | 0x0 | 0x3006c04c | 0x929d0 | 0x913d0 | 0x1a9 |
GetUserNameW | 0x0 | 0x3006c050 | 0x929d4 | 0x913d4 | 0x17b |
SetNamedSecurityInfoA | 0x0 | 0x3006c054 | 0x929d8 | 0x913d8 | 0x2e0 |
ConvertStringSidToSidA | 0x0 | 0x3006c058 | 0x929dc | 0x913dc | 0x82 |
AddAccessAllowedAceEx | 0x0 | 0x3006c05c | 0x929e0 | 0x913e0 | 0x11 |
SHELL32.dll (5)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SHGetFolderPathW | 0x0 | 0x3006c2bc | 0x92c40 | 0x91640 | 0x157 |
SHGetFolderPathA | 0x0 | 0x3006c2c0 | 0x92c44 | 0x91644 | 0x153 |
ShellExecuteW | 0x0 | 0x3006c2c4 | 0x92c48 | 0x91648 | 0x1b6 |
ShellExecuteA | 0x0 | 0x3006c2c8 | 0x92c4c | 0x9164c | 0x1b2 |
ExtractIconExA | 0x0 | 0x3006c2cc | 0x92c50 | 0x91650 | 0x32 |
ole32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CoCreateInstance | 0x0 | 0x3006c458 | 0x92ddc | 0x917dc | 0x28 |
CreateStreamOnHGlobal | 0x0 | 0x3006c45c | 0x92de0 | 0x917e0 | 0xa8 |
GetHGlobalFromStream | 0x0 | 0x3006c460 | 0x92de4 | 0x917e4 | 0xbd |
StgOpenStorage | 0x0 | 0x3006c464 | 0x92de8 | 0x917e8 | 0x1c2 |
CLSIDFromString | 0x0 | 0x3006c468 | 0x92dec | 0x917ec | 0xc |
CoInitialize | 0x0 | 0x3006c46c | 0x92df0 | 0x917f0 | 0x5d |
OleUninitialize | 0x0 | 0x3006c470 | 0x92df4 | 0x917f4 | 0x18d |
OleInitialize | 0x0 | 0x3006c474 | 0x92df8 | 0x917f8 | 0x170 |
OLEAUT32.dll (7)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x6 | 0x3006c280 | 0x92c04 | 0x91604 | - |
OleSavePictureFile | 0x1a7 | 0x3006c284 | 0x92c08 | 0x91608 | - |
OleCreatePictureIndirect | 0x1a3 | 0x3006c288 | 0x92c0c | 0x9160c | - |
SysAllocStringByteLen | 0x96 | 0x3006c28c | 0x92c10 | 0x91610 | - |
SysAllocStringLen | 0x4 | 0x3006c290 | 0x92c14 | 0x91614 | - |
VariantClear | 0x9 | 0x3006c294 | 0x92c18 | 0x91618 | - |
SysAllocString | 0x2 | 0x3006c298 | 0x92c1c | 0x9161c | - |
SHLWAPI.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
PathMakeSystemFolderA | 0x0 | 0x3006c2d4 | 0x92c58 | 0x91658 | 0x7a |
StrChrA | 0x0 | 0x3006c2d8 | 0x92c5c | 0x9165c | 0x119 |
bcrypt.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
BCryptCloseAlgorithmProvider | 0x0 | 0x3006c41c | 0x92da0 | 0x917a0 | 0x2 |
BCryptOpenAlgorithmProvider | 0x0 | 0x3006c420 | 0x92da4 | 0x917a4 | 0x27 |
BCryptGetProperty | 0x0 | 0x3006c424 | 0x92da8 | 0x917a8 | 0x21 |
BCryptGenRandom | 0x0 | 0x3006c428 | 0x92dac | 0x917ac | 0x1d |
BCryptDestroyHash | 0x0 | 0x3006c42c | 0x92db0 | 0x917b0 | 0xd |
BCryptFinishHash | 0x0 | 0x3006c430 | 0x92db4 | 0x917b4 | 0x1b |
BCryptHashData | 0x0 | 0x3006c434 | 0x92db8 | 0x917b8 | 0x23 |
BCryptCreateHash | 0x0 | 0x3006c438 | 0x92dbc | 0x917bc | 0x6 |
BCryptDestroyKey | 0x0 | 0x3006c43c | 0x92dc0 | 0x917c0 | 0xe |
BCryptDecrypt | 0x0 | 0x3006c440 | 0x92dc4 | 0x917c4 | 0x8 |
BCryptEncrypt | 0x0 | 0x3006c444 | 0x92dc8 | 0x917c8 | 0x12 |
BCryptGenerateSymmetricKey | 0x0 | 0x3006c448 | 0x92dcc | 0x917cc | 0x1f |
WININET.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
InternetErrorDlg | 0x0 | 0x3006c3f4 | 0x92d78 | 0x91778 | 0xa7 |
InternetFindNextFileW | 0x0 | 0x3006c3f8 | 0x92d7c | 0x9177c | 0xa9 |
NETAPI32.dll (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
NetUserGetInfo | 0x0 | 0x3006c25c | 0x92be0 | 0x915e0 | 0xee |
NetApiBufferFree | 0x0 | 0x3006c260 | 0x92be4 | 0x915e4 | 0x51 |
NetGroupAddUser | 0x0 | 0x3006c264 | 0x92be8 | 0x915e8 | 0x89 |
NetUserModalsGet | 0x0 | 0x3006c268 | 0x92bec | 0x915ec | 0xf0 |
NetUserDel | 0x0 | 0x3006c26c | 0x92bf0 | 0x915f0 | 0xeb |
NetUserAdd | 0x0 | 0x3006c270 | 0x92bf4 | 0x915f4 | 0xe9 |
PSAPI.DLL (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetModuleFileNameExA | 0x0 | 0x3006c2a0 | 0x92c24 | 0x91624 | 0xf |
GetModuleInformation | 0x0 | 0x3006c2a4 | 0x92c28 | 0x91628 | 0x11 |
USERENV.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ExpandEnvironmentStringsForUserA | 0x0 | 0x3006c3ec | 0x92d70 | 0x91770 | 0x10 |
MSACM32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
acmDriverDetailsA | 0x0 | 0x3006c250 | 0x92bd4 | 0x915d4 | 0x4 |
acmDriverID | 0x0 | 0x3006c254 | 0x92bd8 | 0x915d8 | 0x7 |
COMCTL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
(by ordinal) | 0x19c | 0x3006c064 | 0x929e8 | 0x913e8 | - |
pdh.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
PdhEnumObjectItemsW | 0x0 | 0x3006c47c | 0x92e00 | 0x91800 | 0x23 |
SETUPAPI.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SetupDiEnumDeviceInfo | 0x0 | 0x3006c2ac | 0x92c30 | 0x91630 | 0x140 |
SetupDiDestroyDeviceInfoList | 0x0 | 0x3006c2b0 | 0x92c34 | 0x91634 | 0x13d |
SetupDiGetClassDevsA | 0x0 | 0x3006c2b4 | 0x92c38 | 0x91638 | 0x151 |
d3d9.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
Direct3DCreate9 | 0x0 | 0x3006c450 | 0x92dd4 | 0x917d4 | 0xa |
NTDSAPI.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DsGetRdnW | 0x0 | 0x3006c278 | 0x92bfc | 0x915fc | 0x34 |
Memory Dumps (145)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Points | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
lithuanianicmercy.exe | 1 | 0x30000000 | 0x30332FFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x004F0000 | 0x00526FFF | First Execution | - | 32-bit | 0x004F0000 |
![]() |
![]() |
...
|
buffer | 1 | 0x003E0000 | 0x003E0FFF | First Execution | - | 32-bit | 0x003E0000 |
![]() |
![]() |
...
|
buffer | 1 | 0x003E0000 | 0x003E0FFF | First Execution | - | 32-bit | 0x003E0000 |
![]() |
![]() |
...
|
buffer | 1 | 0x003E0000 | 0x003E0FFF | First Execution | - | 32-bit | 0x003E0000 |
![]() |
![]() |
...
|
buffer | 1 | 0x003E0000 | 0x003E0FFF | First Execution | - | 32-bit | 0x003E0000 |
![]() |
![]() |
...
|
buffer | 1 | 0x003E0000 | 0x003E0FFF | First Execution | - | 32-bit | 0x003E0000 |
![]() |
![]() |
...
|
buffer | 1 | 0x003E0000 | 0x003E0FFF | First Execution | - | 32-bit | 0x003E0000 |
![]() |
![]() |
...
|
buffer | 1 | 0x003E0000 | 0x003E0FFF | First Execution | - | 32-bit | 0x003E0000 |
![]() |
![]() |
...
|
buffer | 1 | 0x003E0000 | 0x003E0FFF | First Execution | - | 32-bit | 0x003E0000 |
![]() |
![]() |
...
|
buffer | 1 | 0x003E0000 | 0x003E0FFF | First Execution | - | 32-bit | 0x003E0000 |
![]() |
![]() |
...
|
buffer | 1 | 0x003E0000 | 0x003E0FFF | First Execution | - | 32-bit | 0x003E0000 |
![]() |
![]() |
...
|
buffer | 1 | 0x003E0000 | 0x003E0FFF | First Execution | - | 32-bit | 0x003E0000 |
![]() |
![]() |
...
|
buffer | 1 | 0x003E0000 | 0x003E0FFF | First Execution | - | 32-bit | 0x003E0000 |
![]() |
![]() |
...
|
buffer | 1 | 0x003E0000 | 0x003E0FFF | First Execution | - | 32-bit | 0x003E0000 |
![]() |
![]() |
...
|
buffer | 1 | 0x003E0000 | 0x003E0FFF | First Execution | - | 32-bit | 0x003E0000 |
![]() |
![]() |
...
|
buffer | 1 | 0x003E0000 | 0x003E0FFF | First Execution | - | 32-bit | 0x003E0000 |
![]() |
![]() |
...
|
buffer | 1 | 0x004F0000 | 0x00526FFF | Content Changed | - | 32-bit | 0x004F3124 |
![]() |
![]() |
...
|
buffer | 1 | 0x004F0000 | 0x00526FFF | Content Changed | - | 32-bit | 0x004F4994 |
![]() |
![]() |
...
|
buffer | 1 | 0x003E0000 | 0x003E0FFF | First Execution | - | 32-bit | 0x003E0000 |
![]() |
![]() |
...
|
lithuanianicmercy.exe | 1 | 0x30000000 | 0x30332FFF | Process Termination | - | 32-bit | - |
![]() |
![]() |
...
|
lithuanianicmercy.exe | 2 | 0x30000000 | 0x30332FFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x00240000 | 0x00241FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x14190000 | 0x14191FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x14190000 | 0x14190FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x1C460000 | 0x1C460FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 2 | 0x14190000 | 0x14190FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 2 | 0x14190000 | 0x14191FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
buffer | 3 | 0x002D0000 | 0x002D0FFF | First Execution | - | 32-bit | 0x002D0000 |
![]() |
![]() |
...
|
prvtqjz.exe | 20 | 0x30000000 | 0x30332FFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x1C320000 | 0x1C321FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x1CD20000 | 0x1CD21FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x1CBE0000 | 0x1CBE1FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x1C6E0000 | 0x1C6E1FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x1CAA0000 | 0x1CAA1FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x1CAA0000 | 0x1CAA1FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 2 | 0x02040000 | 0x02041FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 2 | 0x02040000 | 0x02041FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 2 | 0x02040000 | 0x02041FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 2 | 0x02040000 | 0x02041FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
buffer | 2 | 0x026B0000 | 0x026B1FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 21 | 0x001E0000 | 0x001E0FFF | First Execution | - | 32-bit | 0x001E0000 |
![]() |
![]() |
...
|
yzyveze.exe | 63 | 0x30000000 | 0x30332FFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x026B0000 | 0x026B1FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x025E0000 | 0x025E1FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x025E0000 | 0x025E1FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x025E0000 | 0x025E1FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
buffer | 2 | 0x025E0000 | 0x025E1FFF | Content Changed | - | 32-bit | - |
![]() |
![]() |
...
|
lithuanianicmercy.exe | 2 | 0x30000000 | 0x30332FFF | Final Dump | - | 32-bit | - |
![]() |
![]() |
...
|
c:\programdata\microsoft\crypto\rsa\machinekeys\08e575673cce10c72090304839888e02_0303d5b4-ffe9-470e-9dd8-7d9ec416e53f | Dropped File | Stream |
Not Queried
|
...
|
»