VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: Wiper, Dropper, Trojan, Ransomware |
Takeaway (2).exe
Windows Exe (x86-32)
Created at 2019-11-04T12:14:00
Remarks
(0x200001e): The maximum size of extracted files was exceeded. Some files may be missing in the report.
(0x200001d): The maximum number of extracted files was exceeded. Some files may be missing in the report.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Takeaway (2).exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x41cec9 |
Size Of Code | 0x2e200 |
Size Of Initialized Data | 0x2f800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2017-08-11 13:54:06+00:00 |
Sections (6)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x2e1cb | 0x2e200 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.69 |
.rdata | 0x430000 | 0x98a0 | 0x9a00 | 0x2e600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.12 |
.data | 0x43a000 | 0x1f290 | 0xc00 | 0x38000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.24 |
.gfids | 0x45a000 | 0xe8 | 0x200 | 0x38c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 2.06 |
.rsrc | 0x45b000 | 0x4680 | 0x4800 | 0x38e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.64 |
.reloc | 0x460000 | 0x1f58 | 0x2000 | 0x3d600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.62 |
Imports (1)
»
KERNEL32.dll (134)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetLastError | 0x0 | 0x430000 | 0x38c9c | 0x3729c | 0x202 |
SetLastError | 0x0 | 0x430004 | 0x38ca0 | 0x372a0 | 0x473 |
GetCurrentProcess | 0x0 | 0x430008 | 0x38ca4 | 0x372a4 | 0x1c0 |
DeviceIoControl | 0x0 | 0x43000c | 0x38ca8 | 0x372a8 | 0xdd |
SetFileTime | 0x0 | 0x430010 | 0x38cac | 0x372ac | 0x46a |
CloseHandle | 0x0 | 0x430014 | 0x38cb0 | 0x372b0 | 0x52 |
CreateDirectoryW | 0x0 | 0x430018 | 0x38cb4 | 0x372b4 | 0x81 |
RemoveDirectoryW | 0x0 | 0x43001c | 0x38cb8 | 0x372b8 | 0x403 |
CreateFileW | 0x0 | 0x430020 | 0x38cbc | 0x372bc | 0x8f |
DeleteFileW | 0x0 | 0x430024 | 0x38cc0 | 0x372c0 | 0xd6 |
CreateHardLinkW | 0x0 | 0x430028 | 0x38cc4 | 0x372c4 | 0x93 |
GetShortPathNameW | 0x0 | 0x43002c | 0x38cc8 | 0x372c8 | 0x261 |
GetLongPathNameW | 0x0 | 0x430030 | 0x38ccc | 0x372cc | 0x20f |
MoveFileW | 0x0 | 0x430034 | 0x38cd0 | 0x372d0 | 0x363 |
GetFileType | 0x0 | 0x430038 | 0x38cd4 | 0x372d4 | 0x1f3 |
GetStdHandle | 0x0 | 0x43003c | 0x38cd8 | 0x372d8 | 0x264 |
WriteFile | 0x0 | 0x430040 | 0x38cdc | 0x372dc | 0x525 |
ReadFile | 0x0 | 0x430044 | 0x38ce0 | 0x372e0 | 0x3c0 |
FlushFileBuffers | 0x0 | 0x430048 | 0x38ce4 | 0x372e4 | 0x157 |
SetEndOfFile | 0x0 | 0x43004c | 0x38ce8 | 0x372e8 | 0x453 |
SetFilePointer | 0x0 | 0x430050 | 0x38cec | 0x372ec | 0x466 |
SetFileAttributesW | 0x0 | 0x430054 | 0x38cf0 | 0x372f0 | 0x461 |
GetFileAttributesW | 0x0 | 0x430058 | 0x38cf4 | 0x372f4 | 0x1ea |
FindClose | 0x0 | 0x43005c | 0x38cf8 | 0x372f8 | 0x12e |
FindFirstFileW | 0x0 | 0x430060 | 0x38cfc | 0x372fc | 0x139 |
FindNextFileW | 0x0 | 0x430064 | 0x38d00 | 0x37300 | 0x145 |
GetVersionExW | 0x0 | 0x430068 | 0x38d04 | 0x37304 | 0x2a4 |
GetCurrentDirectoryW | 0x0 | 0x43006c | 0x38d08 | 0x37308 | 0x1bf |
GetFullPathNameW | 0x0 | 0x430070 | 0x38d0c | 0x3730c | 0x1fb |
FoldStringW | 0x0 | 0x430074 | 0x38d10 | 0x37310 | 0x15c |
GetModuleFileNameW | 0x0 | 0x430078 | 0x38d14 | 0x37314 | 0x214 |
GetModuleHandleW | 0x0 | 0x43007c | 0x38d18 | 0x37318 | 0x218 |
FindResourceW | 0x0 | 0x430080 | 0x38d1c | 0x3731c | 0x14e |
FreeLibrary | 0x0 | 0x430084 | 0x38d20 | 0x37320 | 0x162 |
GetProcAddress | 0x0 | 0x430088 | 0x38d24 | 0x37324 | 0x245 |
GetCurrentProcessId | 0x0 | 0x43008c | 0x38d28 | 0x37328 | 0x1c1 |
ExitProcess | 0x0 | 0x430090 | 0x38d2c | 0x3732c | 0x119 |
SetThreadExecutionState | 0x0 | 0x430094 | 0x38d30 | 0x37330 | 0x493 |
Sleep | 0x0 | 0x430098 | 0x38d34 | 0x37334 | 0x4b2 |
LoadLibraryW | 0x0 | 0x43009c | 0x38d38 | 0x37338 | 0x33f |
GetSystemDirectoryW | 0x0 | 0x4300a0 | 0x38d3c | 0x3733c | 0x270 |
CompareStringW | 0x0 | 0x4300a4 | 0x38d40 | 0x37340 | 0x64 |
AllocConsole | 0x0 | 0x4300a8 | 0x38d44 | 0x37344 | 0x10 |
FreeConsole | 0x0 | 0x4300ac | 0x38d48 | 0x37348 | 0x15f |
AttachConsole | 0x0 | 0x4300b0 | 0x38d4c | 0x3734c | 0x17 |
WriteConsoleW | 0x0 | 0x4300b4 | 0x38d50 | 0x37350 | 0x524 |
GetProcessAffinityMask | 0x0 | 0x4300b8 | 0x38d54 | 0x37354 | 0x246 |
CreateThread | 0x0 | 0x4300bc | 0x38d58 | 0x37358 | 0xb5 |
SetThreadPriority | 0x0 | 0x4300c0 | 0x38d5c | 0x3735c | 0x499 |
InitializeCriticalSection | 0x0 | 0x4300c4 | 0x38d60 | 0x37360 | 0x2e2 |
EnterCriticalSection | 0x0 | 0x4300c8 | 0x38d64 | 0x37364 | 0xee |
LeaveCriticalSection | 0x0 | 0x4300cc | 0x38d68 | 0x37368 | 0x339 |
DeleteCriticalSection | 0x0 | 0x4300d0 | 0x38d6c | 0x3736c | 0xd1 |
SetEvent | 0x0 | 0x4300d4 | 0x38d70 | 0x37370 | 0x459 |
ResetEvent | 0x0 | 0x4300d8 | 0x38d74 | 0x37374 | 0x40f |
ReleaseSemaphore | 0x0 | 0x4300dc | 0x38d78 | 0x37378 | 0x3fe |
WaitForSingleObject | 0x0 | 0x4300e0 | 0x38d7c | 0x3737c | 0x4f9 |
CreateEventW | 0x0 | 0x4300e4 | 0x38d80 | 0x37380 | 0x85 |
CreateSemaphoreW | 0x0 | 0x4300e8 | 0x38d84 | 0x37384 | 0xae |
GetSystemTime | 0x0 | 0x4300ec | 0x38d88 | 0x37388 | 0x277 |
SystemTimeToTzSpecificLocalTime | 0x0 | 0x4300f0 | 0x38d8c | 0x3738c | 0x4be |
TzSpecificLocalTimeToSystemTime | 0x0 | 0x4300f4 | 0x38d90 | 0x37390 | 0x4d0 |
SystemTimeToFileTime | 0x0 | 0x4300f8 | 0x38d94 | 0x37394 | 0x4bd |
FileTimeToLocalFileTime | 0x0 | 0x4300fc | 0x38d98 | 0x37398 | 0x124 |
LocalFileTimeToFileTime | 0x0 | 0x430100 | 0x38d9c | 0x3739c | 0x346 |
FileTimeToSystemTime | 0x0 | 0x430104 | 0x38da0 | 0x373a0 | 0x125 |
GetCPInfo | 0x0 | 0x430108 | 0x38da4 | 0x373a4 | 0x172 |
IsDBCSLeadByte | 0x0 | 0x43010c | 0x38da8 | 0x373a8 | 0x2fe |
MultiByteToWideChar | 0x0 | 0x430110 | 0x38dac | 0x373ac | 0x367 |
WideCharToMultiByte | 0x0 | 0x430114 | 0x38db0 | 0x373b0 | 0x511 |
GlobalAlloc | 0x0 | 0x430118 | 0x38db4 | 0x373b4 | 0x2b3 |
GetTickCount | 0x0 | 0x43011c | 0x38db8 | 0x373b8 | 0x293 |
SetCurrentDirectoryW | 0x0 | 0x430120 | 0x38dbc | 0x373bc | 0x44d |
GetExitCodeProcess | 0x0 | 0x430124 | 0x38dc0 | 0x373c0 | 0x1df |
GetLocalTime | 0x0 | 0x430128 | 0x38dc4 | 0x373c4 | 0x203 |
MapViewOfFile | 0x0 | 0x43012c | 0x38dc8 | 0x373c8 | 0x357 |
UnmapViewOfFile | 0x0 | 0x430130 | 0x38dcc | 0x373cc | 0x4d6 |
CreateFileMappingW | 0x0 | 0x430134 | 0x38dd0 | 0x373d0 | 0x8c |
OpenFileMappingW | 0x0 | 0x430138 | 0x38dd4 | 0x373d4 | 0x379 |
GetCommandLineW | 0x0 | 0x43013c | 0x38dd8 | 0x373d8 | 0x187 |
SetEnvironmentVariableW | 0x0 | 0x430140 | 0x38ddc | 0x373dc | 0x457 |
ExpandEnvironmentStringsW | 0x0 | 0x430144 | 0x38de0 | 0x373e0 | 0x11d |
GetTempPathW | 0x0 | 0x430148 | 0x38de4 | 0x373e4 | 0x285 |
MoveFileExW | 0x0 | 0x43014c | 0x38de8 | 0x373e8 | 0x360 |
GetLocaleInfoW | 0x0 | 0x430150 | 0x38dec | 0x373ec | 0x206 |
GetTimeFormatW | 0x0 | 0x430154 | 0x38df0 | 0x373f0 | 0x297 |
GetDateFormatW | 0x0 | 0x430158 | 0x38df4 | 0x373f4 | 0x1c8 |
GetNumberFormatW | 0x0 | 0x43015c | 0x38df8 | 0x373f8 | 0x233 |
RaiseException | 0x0 | 0x430160 | 0x38dfc | 0x373fc | 0x3b1 |
GetSystemInfo | 0x0 | 0x430164 | 0x38e00 | 0x37400 | 0x273 |
VirtualProtect | 0x0 | 0x430168 | 0x38e04 | 0x37404 | 0x4ef |
VirtualQuery | 0x0 | 0x43016c | 0x38e08 | 0x37408 | 0x4f1 |
LoadLibraryExA | 0x0 | 0x430170 | 0x38e0c | 0x3740c | 0x33d |
IsProcessorFeaturePresent | 0x0 | 0x430174 | 0x38e10 | 0x37410 | 0x304 |
IsDebuggerPresent | 0x0 | 0x430178 | 0x38e14 | 0x37414 | 0x300 |
UnhandledExceptionFilter | 0x0 | 0x43017c | 0x38e18 | 0x37418 | 0x4d3 |
SetUnhandledExceptionFilter | 0x0 | 0x430180 | 0x38e1c | 0x3741c | 0x4a5 |
GetStartupInfoW | 0x0 | 0x430184 | 0x38e20 | 0x37420 | 0x263 |
QueryPerformanceCounter | 0x0 | 0x430188 | 0x38e24 | 0x37424 | 0x3a7 |
GetCurrentThreadId | 0x0 | 0x43018c | 0x38e28 | 0x37428 | 0x1c5 |
GetSystemTimeAsFileTime | 0x0 | 0x430190 | 0x38e2c | 0x3742c | 0x279 |
InitializeSListHead | 0x0 | 0x430194 | 0x38e30 | 0x37430 | 0x2e7 |
TerminateProcess | 0x0 | 0x430198 | 0x38e34 | 0x37434 | 0x4c0 |
RtlUnwind | 0x0 | 0x43019c | 0x38e38 | 0x37438 | 0x418 |
EncodePointer | 0x0 | 0x4301a0 | 0x38e3c | 0x3743c | 0xea |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x4301a4 | 0x38e40 | 0x37440 | 0x2e3 |
TlsAlloc | 0x0 | 0x4301a8 | 0x38e44 | 0x37444 | 0x4c5 |
TlsGetValue | 0x0 | 0x4301ac | 0x38e48 | 0x37448 | 0x4c7 |
TlsSetValue | 0x0 | 0x4301b0 | 0x38e4c | 0x3744c | 0x4c8 |
TlsFree | 0x0 | 0x4301b4 | 0x38e50 | 0x37450 | 0x4c6 |
LoadLibraryExW | 0x0 | 0x4301b8 | 0x38e54 | 0x37454 | 0x33e |
QueryPerformanceFrequency | 0x0 | 0x4301bc | 0x38e58 | 0x37458 | 0x3a8 |
GetModuleHandleExW | 0x0 | 0x4301c0 | 0x38e5c | 0x3745c | 0x217 |
GetModuleFileNameA | 0x0 | 0x4301c4 | 0x38e60 | 0x37460 | 0x213 |
GetACP | 0x0 | 0x4301c8 | 0x38e64 | 0x37464 | 0x168 |
HeapFree | 0x0 | 0x4301cc | 0x38e68 | 0x37468 | 0x2cf |
HeapAlloc | 0x0 | 0x4301d0 | 0x38e6c | 0x3746c | 0x2cb |
HeapReAlloc | 0x0 | 0x4301d4 | 0x38e70 | 0x37470 | 0x2d2 |
GetStringTypeW | 0x0 | 0x4301d8 | 0x38e74 | 0x37474 | 0x269 |
LCMapStringW | 0x0 | 0x4301dc | 0x38e78 | 0x37478 | 0x32d |
FindFirstFileExA | 0x0 | 0x4301e0 | 0x38e7c | 0x3747c | 0x133 |
FindNextFileA | 0x0 | 0x4301e4 | 0x38e80 | 0x37480 | 0x143 |
IsValidCodePage | 0x0 | 0x4301e8 | 0x38e84 | 0x37484 | 0x30a |
GetOEMCP | 0x0 | 0x4301ec | 0x38e88 | 0x37488 | 0x237 |
GetCommandLineA | 0x0 | 0x4301f0 | 0x38e8c | 0x3748c | 0x186 |
GetEnvironmentStringsW | 0x0 | 0x4301f4 | 0x38e90 | 0x37490 | 0x1da |
FreeEnvironmentStringsW | 0x0 | 0x4301f8 | 0x38e94 | 0x37494 | 0x161 |
GetProcessHeap | 0x0 | 0x4301fc | 0x38e98 | 0x37498 | 0x24a |
SetStdHandle | 0x0 | 0x430200 | 0x38e9c | 0x3749c | 0x487 |
HeapSize | 0x0 | 0x430204 | 0x38ea0 | 0x374a0 | 0x2d4 |
GetConsoleCP | 0x0 | 0x430208 | 0x38ea4 | 0x374a4 | 0x19a |
GetConsoleMode | 0x0 | 0x43020c | 0x38ea8 | 0x374a8 | 0x1ac |
SetFilePointerEx | 0x0 | 0x430210 | 0x38eac | 0x374ac | 0x467 |
DecodePointer | 0x0 | 0x430214 | 0x38eb0 | 0x374b0 | 0xca |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Points | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
takeaway (2).exe | 1 | 0x00ED0000 | 0x00F31FFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
takeaway (2).exe | 1 | 0x00ED0000 | 0x00F31FFF | Process Termination | - | 32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Trojan.Heur.LShot.1 |
Malicious
|
File Reputation Information
»
Severity |
Suspicious
|
First Seen | 2018-09-26 08:55 (UTC+2) |
Last Seen | 2018-09-26 08:55 (UTC+2) |
Names | Win32.Trojan.Lshot |
Families | Lshot |
Classification | Trojan |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Trojan.Heur.LShot.1 |
Malicious
|
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winhost.exe | Dropped File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2018-12-14 16:27 (UTC+1) |
Last Seen | 2018-12-15 17:33 (UTC+1) |
Names | Win32.Trojan.Crysis |
Families | Crysis |
Classification | Trojan |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x40a9d0 |
Size Of Code | 0x9e00 |
Size Of Initialized Data | 0xd400 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2017-03-02 23:49:06+00:00 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x9c25 | 0x9e00 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.97 |
.rdata | 0x40b000 | 0x2636 | 0x2800 | 0xa200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.79 |
.data | 0x40e000 | 0xaad5 | 0xa800 | 0xca00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.98 |
Imports (1)
»
KERNEL32.dll (9)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetProcAddress | 0x0 | 0x40b000 | 0xd508 | 0xc708 | 0x245 |
LoadLibraryA | 0x0 | 0x40b004 | 0xd50c | 0xc70c | 0x33c |
WaitForSingleObject | 0x0 | 0x40b008 | 0xd510 | 0xc710 | 0x4f9 |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x40b00c | 0xd514 | 0xc714 | 0x2e3 |
LeaveCriticalSection | 0x0 | 0x40b010 | 0xd518 | 0xc718 | 0x339 |
GetLastError | 0x0 | 0x40b014 | 0xd51c | 0xc71c | 0x202 |
EnterCriticalSection | 0x0 | 0x40b018 | 0xd520 | 0xc720 | 0xee |
ReleaseMutex | 0x0 | 0x40b01c | 0xd524 | 0xc724 | 0x3fa |
CloseHandle | 0x0 | 0x40b020 | 0xd528 | 0xc728 | 0x52 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Trojan.Ransom.Crysis.E |
Malicious
|
C:\Boot\BOOTSTAT.DAT.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\BOOTSECT.BAK.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlookMUI.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordMUI.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es\Proof.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\Proof.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proofing.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Office32MUI.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\InfoPathMUI.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-00A1-0409-1000-0000000FF1CE}-C\OneNoteMUI.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-00A1-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-00B4-0409-1000-0000000FF1CE}-C\ProjectMUI.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-00B4-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-0054-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-0054-0409-1000-0000000FF1CE}-C\VisioMUI.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.msi.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-00BA-0409-1000-0000000FF1CE}-C\GrooveMUI.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-00BA-0409-1000-0000000FF1CE}-C\Setup.xml.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\Proof.msi.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proofing.msi.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Office32MUI.msi.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Malicious
|
...
|
»
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
DharmaEncryptedFile | File encrypted by Dharma Ransomware | Ransomware |
5/5
|
...
|
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PubLR.cab.id-9C354B42.[fire_show@tuta.io].adobe | Modified File | Stream |
Unknown
|
...
|
»
C:\$Recycle.Bin\S-1-5-21-3388679973-3930757225-3770151564-1000\desktop.ini.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PptLR.cab.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.msi.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.msi.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelLR.cab.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlkLR.cab.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.msi.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlookMUI.msi.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordLR.cab.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordMUI.msi.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.cab.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\Proof.cab.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\InfLR.cab.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\OWOW32LR.cab.id-9C354B42.[fire_show@tuta.io].adobe | Dropped File | Stream |
Unknown
|
...
|
»