VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Ransomware
Dropper
|
Threat Names: |
Gen:Variant.MSILDrop.1
Gen:Variant.Razy.589735
Gen:Variant.Application.Johnnie.101202
...
|
alien ransomware builder cracked free.exe
Windows Exe (x86-32)
Created at 2020-02-10T10:00:00
Remarks
(0x0200001B): The maximum number of file reputation requests per analysis (150) was exceeded.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\FD1HVy\Desktop\alien ransomware builder cracked free.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x404d2e |
Size Of Code | 0x2e00 |
Size Of Initialized Data | 0x1000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2009-10-24 08:15:51+00:00 |
Version Information (8)
»
Assembly Version | 1.0.0.0 |
FileDescription | Mstub |
FileVersion | 1.0.0.0 |
InternalName | stub.exe |
LegalCopyright | Copyright © 2009 |
OriginalFilename | stub.exe |
ProductName | Mstub |
ProductVersion | 1.0.0.0 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0x2d34 | 0x2e00 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.67 |
.sdata | 0x406000 | 0x91 | 0x200 | 0x3200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.06 |
.rsrc | 0x408000 | 0xa18 | 0xc00 | 0x3400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.59 |
.reloc | 0x40a000 | 0xc | 0x200 | 0x4000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.08 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0x4d08 | 0x3108 | 0x0 |
Memory Dumps (15)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
alien ransomware builder cracked free.exe | 1 | 0x00B70000 | 0x00B7BFFF | Relevant Image |
![]() |
64-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFBB9D7B000 | 0x7FFBB9D7BFFF | First Execution |
![]() |
64-bit | 0x7FFBB9D7B000 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFBB9E48000 | 0x7FFBB9E48FFF | First Execution |
![]() |
64-bit | 0x7FFBB9E48040 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFBB9E50000 | 0x7FFBB9E5FFFF | First Execution |
![]() |
64-bit | 0x7FFBB9E50080 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFBB9E4A000 | 0x7FFBB9E4AFFF | First Execution |
![]() |
64-bit | 0x7FFBB9E4A012 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFBB9CB4000 | 0x7FFBB9CB4FFF | First Execution |
![]() |
64-bit | 0x7FFBB9CB4048 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFBB9E50000 | 0x7FFBB9E5FFFF | Content Changed |
![]() |
64-bit | 0x7FFBB9E51012 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFBB9E01000 | 0x7FFBB9E01FFF | First Execution |
![]() |
64-bit | 0x7FFBB9E01060 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFBB9D7B000 | 0x7FFBB9D7BFFF | Content Changed |
![]() |
64-bit | 0x7FFBB9D7BE60 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFBB9E4B000 | 0x7FFBB9E4BFFF | First Execution |
![]() |
64-bit | 0x7FFBB9E4B060 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFBB9E4C000 | 0x7FFBB9E4CFFF | First Execution |
![]() |
64-bit | 0x7FFBB9E4C020 |
![]() |
![]() |
...
|
buffer | 1 | 0x01222000 | 0x01223FFF | Marked Executable |
![]() |
64-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x1B850000 | 0x1B856FFF | Marked Executable |
![]() |
64-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFBB9CC9000 | 0x7FFBB9CC9FFF | Marked Executable |
![]() |
64-bit | - |
![]() |
![]() |
...
|
alien ransomware builder cracked free.exe | 1 | 0x00B70000 | 0x00B7BFFF | Process Termination |
![]() |
64-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.MSILDrop.1 |
Malicious
|
C:\Users\FD1HVy\AppData\Local\Temp\Q0.exe | Dropped File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x404d2e |
Size Of Code | 0x2e00 |
Size Of Initialized Data | 0x1000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2009-10-24 08:15:51+00:00 |
Version Information (8)
»
Assembly Version | 1.0.0.0 |
FileDescription | Mstub |
FileVersion | 1.0.0.0 |
InternalName | stub.exe |
LegalCopyright | Copyright © 2009 |
OriginalFilename | stub.exe |
ProductName | Mstub |
ProductVersion | 1.0.0.0 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0x2d34 | 0x2e00 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.67 |
.sdata | 0x406000 | 0x91 | 0x200 | 0x3200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.06 |
.rsrc | 0x408000 | 0xa18 | 0xc00 | 0x3400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.59 |
.reloc | 0x40a000 | 0xc | 0x200 | 0x4000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.08 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0x4d08 | 0x3108 | 0x0 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.Razy.589735 |
Malicious
|
C:\Users\FD1HVy\AppData\Local\Temp\Q2.exe | Dropped File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x40317e |
Size Of Code | 0x1200 |
Size Of Initialized Data | 0x8600 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_cui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2019-11-30 00:15:47+00:00 |
Version Information (7)
»
Assembly Version | 0.0.0.0 |
FileDescription | |
FileVersion | 0.0.0.0 |
InternalName | ransomware.exe |
LegalCopyright | |
OriginalFilename | ransomware.exe |
ProductVersion | 0.0.0.0 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0x1184 | 0x1200 | 0x200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.25 |
.rsrc | 0x404000 | 0x8268 | 0x8400 | 0x1400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.71 |
.reloc | 0x40e000 | 0xc | 0x200 | 0x9800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.08 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0x3158 | 0x1358 | 0x0 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
q2.exe | 4 | 0x003B0000 | 0x003BFFFF | Relevant Image |
![]() |
64-bit | - |
![]() |
![]() |
...
|
q2.exe | 4 | 0x003B0000 | 0x003BFFFF | Process Termination |
![]() |
64-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Heur.Ransom.Imps.3 |
Malicious
|
C:\Users\FD1HVy\AppData\Local\Temp\kkk ransomware.exe | Dropped File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4bce80 |
Size Of Code | 0x43000 |
Size Of Initialized Data | 0xc000 |
Size Of Uninitialized Data | 0x7a000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2012-01-29 21:32:28+00:00 |
Version Information (3)
»
CompiledScript | AutoIt v3 Script: 3, 3, 8, 1 |
FileDescription | - |
FileVersion | 3, 3, 8, 1 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
UPX0 | 0x401000 | 0x7a000 | 0x0 | 0x400 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
UPX1 | 0x47b000 | 0x43000 | 0x42200 | 0x400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.93 |
.rsrc | 0x4be000 | 0xc000 | 0xb200 | 0x42600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 6.63 |
Imports (16)
»
KERNEL32.DLL (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LoadLibraryA | 0x0 | 0x4c8f1c | 0xc8f1c | 0x4d51c | 0x0 |
GetProcAddress | 0x0 | 0x4c8f20 | 0xc8f20 | 0x4d520 | 0x0 |
VirtualProtect | 0x0 | 0x4c8f24 | 0xc8f24 | 0x4d524 | 0x0 |
VirtualAlloc | 0x0 | 0x4c8f28 | 0xc8f28 | 0x4d528 | 0x0 |
VirtualFree | 0x0 | 0x4c8f2c | 0xc8f2c | 0x4d52c | 0x0 |
ExitProcess | 0x0 | 0x4c8f30 | 0xc8f30 | 0x4d530 | 0x0 |
ADVAPI32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetAce | 0x0 | 0x4c8f38 | 0xc8f38 | 0x4d538 | 0x0 |
COMCTL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ImageList_Remove | 0x0 | 0x4c8f40 | 0xc8f40 | 0x4d540 | 0x0 |
COMDLG32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetSaveFileNameW | 0x0 | 0x4c8f48 | 0xc8f48 | 0x4d548 | 0x0 |
GDI32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LineTo | 0x0 | 0x4c8f50 | 0xc8f50 | 0x4d550 | 0x0 |
MPR.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WNetGetConnectionW | 0x0 | 0x4c8f58 | 0xc8f58 | 0x4d558 | 0x0 |
ole32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CoInitialize | 0x0 | 0x4c8f60 | 0xc8f60 | 0x4d560 | 0x0 |
OLEAUT32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
VariantInit | 0x8 | 0x4c8f68 | 0xc8f68 | 0x4d568 | - |
PSAPI.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
EnumProcesses | 0x0 | 0x4c8f70 | 0xc8f70 | 0x4d570 | 0x0 |
SHELL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DragFinish | 0x0 | 0x4c8f78 | 0xc8f78 | 0x4d578 | 0x0 |
USER32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetDC | 0x0 | 0x4c8f80 | 0xc8f80 | 0x4d580 | 0x0 |
USERENV.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LoadUserProfileW | 0x0 | 0x4c8f88 | 0xc8f88 | 0x4d588 | 0x0 |
VERSION.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
VerQueryValueW | 0x0 | 0x4c8f90 | 0xc8f90 | 0x4d590 | 0x0 |
WININET.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
FtpOpenFileW | 0x0 | 0x4c8f98 | 0xc8f98 | 0x4d598 | 0x0 |
WINMM.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
timeGetTime | 0x0 | 0x4c8fa0 | 0xc8fa0 | 0x4d5a0 | 0x0 |
WSOCK32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
recv | 0x10 | 0x4c8fa8 | 0xc8fa8 | 0x4d5a8 | - |
Memory Dumps (101)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | First Execution |
![]() |
32-bit | 0x004BCE80 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00410E4B |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00417C20 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0041EF12 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00421EDE |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040F000 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040DB10 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00404170 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00401B10 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00414DB8 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00420603 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0044AFEF |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00428047 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00429335 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00432229 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00444AF8 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004091E0 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040AFA0 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0046E1A6 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0046AB9C |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0047F9A6 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00440847 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0045E951 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0046906D |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0047D79B |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0045DE8F |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004755AD |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00473AD9 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004115D7 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0044BBC8 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040AFA0 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004755AD |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040F380 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00419E30 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0046F993 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00452F37 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0047F9A6 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0046906D |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0043A900 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004270D6 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00480A8D |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0047D79B |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004111DC |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040C790 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0044BBC8 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040AFA0 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004755AD |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040F380 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0044AE3E |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0046F993 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0047F9A6 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004292BD |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00436299 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004169F1 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00478656 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0046906D |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0043A900 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004111DC |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00414DB8 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0041E000 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00431EC8 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0046B9D7 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0045B26A |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00480FA5 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004111DC |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040C2DE |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0045C8FC |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040F430 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00412F40 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00403D76 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00429802 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004169F1 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00480FA5 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004115D7 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004094D7 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00403D76 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00429802 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004169F1 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040F430 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00480A8D |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040C620 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004111DC |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004813FA |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0042A095 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004094D7 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00403D76 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00429802 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004169F1 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040F430 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00480A8D |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040C620 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00403D76 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00429802 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004169F1 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040F430 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00480A8D |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040C620 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040D3FB |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x00479B09 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x004169F1 |
![]() |
![]() |
...
|
kkk ransomware.exe | 9 | 0x00400000 | 0x004C9FFF | Content Changed |
![]() |
32-bit | 0x0040F430 |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.Strictor.180175 |
Malicious
|
C:\Users\FD1HVy\AppData\Local\Temp\Q1.exe | Dropped File | Binary |
Blacklisted
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x40851e |
Size Of Code | 0x6600 |
Size Of Initialized Data | 0x4f000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2013-09-24 14:09:47+00:00 |
Version Information (8)
»
Assembly Version | 1.0.0.0 |
FileDescription | WindowsApplication1 |
FileVersion | 1.0.0.0 |
InternalName | WindowsApplication1.exe |
LegalCopyright | Copyright © 2013 |
OriginalFilename | WindowsApplication1.exe |
ProductName | WindowsApplication1 |
ProductVersion | 1.0.0.0 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0x6524 | 0x6600 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.5 |
.sdata | 0x40a000 | 0xf7 | 0x200 | 0x6a00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.9 |
.rsrc | 0x40c000 | 0x4eb34 | 0x4ec00 | 0x6c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.25 |
.reloc | 0x45c000 | 0xc | 0x200 | 0x55800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.08 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0x84f8 | 0x68f8 | 0x0 |
Memory Dumps (12)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
q1.exe | 3 | 0x002E0000 | 0x0033DFFF | Relevant Image |
![]() |
64-bit | - |
![]() |
![]() |
...
|
buffer | 3 | 0x7FFBB9DAB000 | 0x7FFBB9DABFFF | First Execution |
![]() |
64-bit | 0x7FFBB9DAB020 |
![]() |
![]() |
...
|
buffer | 3 | 0x7FFBB9E77000 | 0x7FFBB9E77FFF | First Execution |
![]() |
64-bit | 0x7FFBB9E77000 |
![]() |
![]() |
...
|
buffer | 3 | 0x7FFBB9CE4000 | 0x7FFBB9CE4FFF | First Execution |
![]() |
64-bit | 0x7FFBB9CE4038 |
![]() |
![]() |
...
|
buffer | 3 | 0x7FFBB9E79000 | 0x7FFBB9E79FFF | First Execution |
![]() |
64-bit | 0x7FFBB9E79000 |
![]() |
![]() |
...
|
buffer | 3 | 0x7FFBB9E31000 | 0x7FFBB9E31FFF | First Execution |
![]() |
64-bit | 0x7FFBB9E313F7 |
![]() |
![]() |
...
|
buffer | 3 | 0x7FFBB9E81000 | 0x7FFBB9E81FFF | First Execution |
![]() |
64-bit | 0x7FFBB9E81070 |
![]() |
![]() |
...
|
buffer | 3 | 0x7FFBB9E7A000 | 0x7FFBB9E7AFFF | First Execution |
![]() |
64-bit | 0x7FFBB9E7A012 |
![]() |
![]() |
...
|
buffer | 3 | 0x7FFBB9E7B000 | 0x7FFBB9E7BFFF | First Execution |
![]() |
64-bit | 0x7FFBB9E7B060 |
![]() |
![]() |
...
|
buffer | 3 | 0x00832000 | 0x00833FFF | Marked Executable |
![]() |
64-bit | - |
![]() |
![]() |
...
|
buffer | 3 | 0x02490000 | 0x02496FFF | Marked Executable |
![]() |
64-bit | - |
![]() |
![]() |
...
|
q1.exe | 3 | 0x002E0000 | 0x0033DFFF | Process Termination |
![]() |
64-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.Application.Johnnie.101202 |
Suspicious
|
c:\users\fd1hvy\appdata\roaming\microsoft\windows\recent\automaticdestinations\f01b4d95cf55d32a.automaticdestinations-ms | Modified File | OLE Compound |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\microsoft\windows\recent\automaticdestinations\5f7b5f1e01b83767.automaticdestinations-ms | Modified File | OLE Compound |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\microsoft\windows\recent\automaticdestinations\f01b4d95cf55d32a.automaticdestinations-ms | Modified File | OLE Compound |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\microsoft\windows\recent\automaticdestinations\5f7b5f1e01b83767.automaticdestinations-ms | Modified File | OLE Compound |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\microsoft\windows\recent\automaticdestinations\f01b4d95cf55d32a.automaticdestinations-ms | Modified File | OLE Compound |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\microsoft\windows\recent\automaticdestinations\5f7b5f1e01b83767.automaticdestinations-ms | Modified File | OLE Compound |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\microsoft\windows\recent\automaticdestinations\f01b4d95cf55d32a.automaticdestinations-ms | Modified File | OLE Compound |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\microsoft\windows\recent\automaticdestinations\5f7b5f1e01b83767.automaticdestinations-ms | Modified File | OLE Compound |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\microsoft\windows\recent\automaticdestinations\f01b4d95cf55d32a.automaticdestinations-ms | Modified File | OLE Compound |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\microsoft\windows\recent\automaticdestinations\5f7b5f1e01b83767.automaticdestinations-ms | Modified File | OLE Compound |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\microsoft\windows\recent\automaticdestinations\f01b4d95cf55d32a.automaticdestinations-ms | Modified File | OLE Compound |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\microsoft\windows\recent\automaticdestinations\5f7b5f1e01b83767.automaticdestinations-ms | Modified File | OLE Compound |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\microsoft\windows\recent\automaticdestinations\f01b4d95cf55d32a.automaticdestinations-ms | Modified File | OLE Compound |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\microsoft\windows\recent\automaticdestinations\5f7b5f1e01b83767.automaticdestinations-ms | Modified File | OLE Compound |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\microsoft\windows\recent\automaticdestinations\5f7b5f1e01b83767.automaticdestinations-ms | Modified File | OLE Compound |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Local\Temp\200 dollars.txt | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\DqUNIlu.gif.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\j51yJlAI1.gif.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\mCQMPnOOyUYP.gif.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\W3nCKPmZd6_T8yGD3CRn.jpg.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\yi TyUTEx1dVRHalW\DN0hvZxxCeH-NYAF_H.png.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\yi TyUTEx1dVRHalW\iCkvEIW.png.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\JkNoq.avi.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\Tab3I0y Y3.avi.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\Kz5g.mp4.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\nYVw1n1XTh2-sApcS7w.mp4.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\WLViPvkU.mp4.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\ED 0nXQ VIkUvYr6\uqU-SQkb\kZHWiDNy.mp4.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\alien ransomware builder cracked free.exe.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Local\Temp\autABA7.tmp | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Local\Temp\gqrfdkv | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.-yB2WD9ZHipl10.mkv | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.0LCfOxpKhBY.mkv | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.63ZOACO2R_kPqlEG.m4a | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.6yMUE.flv | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.7jATM.wav | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.9gEE-.bmp | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.alien ransomware builder cracked free.exe.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.desktop.ini | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.DqUNIlu.gif.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.E hy.wav | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.eacUdxJuUDfuA061.xls | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.EkLB 1ywsMV77uH53.wav | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.ERgdUGLd4HevVs5.odt | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.fqpL_g35J.m4a | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.i6 iY_C6BkJ.m4a | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.j51yJlAI1.gif.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.JkNoq.avi.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.Kz5g.mp4.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.MdUrzCG7I8VQVwhMz8.rtf | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.MH23a5.bmp | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.nYVw1n1XTh2-sApcS7w.mp4.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.og9u_G4EHl49Tl.flv | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.QgQCsu7ShKSSIL.m4a | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.Tab3I0y Y3.avi.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.TtFu8ac2GuQ.mp3 | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.vY9PyxRY3.odp | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.W3nCKPmZd6_T8yGD3CRn.jpg.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.WLViPvkU.mp4.bhacks | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.1px3r9YZM.gif | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.5sRVNiax4.mp4 | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.DjTk 0Dq17Pz4t2AMa.png | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.DZjNZY.gif | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.F74jGmHWDSdyxplK8Zu.gif | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.fM4.mkv | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.GYS46AI.wav | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.lNMKqFE.odt | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.m3JGHdzSozsPviDT.jpg | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.NERYDfycG70.mp3 | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.nst7Asd C.png | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.NWn0_eXN3pgA63Ym.mkv | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.PN5TTWYWv642BYt.png | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.Pvmhff.flv | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.rCxPhCicoc5u7sEbYlz.ots | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.s4dSYQJ4.xlsx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.sn-hlisepFoxRII.xls | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.SROlf 2S5m.m4a | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.UGbEnsFdWrF0NcSzWk2.pdf | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.V7-K_kNP-.pptx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.WvHidWJPV.m4a | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.xin7s.odp | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.x_7SfFt5-eJAhmf88.gif | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Local/Lock.IconCache.db | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy/AppData/Local/Lock.Resmon.ResmonCfg | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Music/Lock.desktop.ini | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Music/Lock.E6IDgLQGE97MYwh0a.wav | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Music/Lock.pFAB.wav | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Music/Lock.pGVUGdUF Vft.mp3 | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Music/Lock.QibhfcBitUE3eN.wav | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Music/Lock.YXHKkgRMJbmq7xZC.mp3 | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Music/Lock._qp6.wav | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.5aASoDBkD4Ug.bmp | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.619JnEBOuc.bmp | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.6MclNK.gif | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.8xG9dA2_eGqi0pv0b0.bmp | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.aJ_Kkru.png | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.cwsPQYJwproUEWJ.jpg | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.desktop.ini | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.E8Pb7e.bmp | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.EHKlEyoM3xoIg8ms.jpg | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.F3GpsjDs7t.png | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.G_BhwPRnGbbQ-dfc.bmp | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.Hv6N_Hm7BbFlazd6N.gif | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.LloJL.jpg | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.LXxgX8.png | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.mwiYwwD-pGtpU_YSC3.bmp | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.pkrWGiqtaBO.gif | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.ul6W7nkKmk8Vcoms6H.gif | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.W9bUf5L8kEVKE-hdQ.png | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.Wi_9DL5txr1IbTGlf8.bmp | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.Y1E-1EvHMk4d A6QVp8.png | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Videos/Lock.A5YVihV.avi | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Videos/Lock.CBK9.flv | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Videos/Lock.dbFeToW6SZRYrK03.flv | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Videos/Lock.desktop.ini | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Videos/Lock.kmyLNxqbxySO-S_H2O9.mp4 | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Videos/Lock.qt2pH0rRBDAlo9_9_.avi | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Videos/Lock.RV_dV0DIDgvgK.avi | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Videos/Lock.sDbATpZQ6r.swf | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Videos/Lock.SuK1W_b3QKmuHjRF.swf | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Videos/Lock.vMM vqaD0kHJ4F.mp4 | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Videos/Lock.X3KII9Ky2zq5leE1M.mkv | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.23iZdkXXLok6512uz.docx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.4pPJKhvtklZXxwQ0M09.docx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.Ax_c.pptx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.cyaer-G0v.pptx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.Database1.accdb | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.desktop.ini | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.faIAqUgP BwWKbX.docx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.iN034yd-ltTggQ-HcC.xlsx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.lmvGT20EAt7X97ts9.pptx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.oXBXXG.xlsx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.qf_lD4ykVY6P7.pptx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.RRwZ.xlsx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.tMLcqE8DzcE8ZL.xlsx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.wdchYxA7KRrFzTiR.odp | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.wrMr9 Fyz8.docx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.XTyOBM6VZ0m.pptx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.YBBoLDeAtb.docx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock._wc0ld1_h 9LSGLE.xlsx | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\Public\Documents/Lock.desktop.ini | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.My Videos | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\Public\Pictures/Lock.desktop.ini | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\Public\Videos/Lock.desktop.ini | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Local\Temp\wl.jpg | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\FD1HVy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup/Microsoft Update.lnk | Dropped File | Shortcut |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\microsoft\windows\recent\automaticdestinations\f01b4d95cf55d32a.automaticdestinations-ms | Modified File | OLE Compound |
Not Queried
|
...
|
»
c:\users\fd1hvy\desktop\ed 0nxq vikuvyr6\uqu-sqkb\e2jrfwuv.xlsx.bhacks | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop\J_gUxI4K04bkqo7tW4.avi.bhacks | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.BlDya8Gp-4HPz6uNsS.xls | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.J_gUxI4K04bkqo7tW4.avi.bhacks | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.mCQMPnOOyUYP.gif.bhacks | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Desktop/Lock.ZvWDNly8ss.csv | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.-M_4r.mp4 | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy/AppData/Roaming/Lock.bNDu1R0FYJg.wav | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Music/Lock.erIdlI.wav | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Music/Lock.JlLewkGtdwovoI.mp3 | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.D7Vw ag.jpg | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.FS3WVwrvnLekT9.jpg | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.H4_H0S0fmbzOF.png | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.ko-PEUGJ.png | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.ktNHTaW.bmp | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.Oj8L14m5Ftw_q T.bmp | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.v1scJjcpwcvzTSqU.png | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Pictures/Lock.yyplXweR.gif | Dropped File | Stream |
Not Queried
|
...
|
»
C:\Users\FD1HVy\Documents/Lock.xocV7C6c.odp | Dropped File | Stream |
Not Queried
|
...
|
»