Created at 2018-09-23 19:12:00
Some extracted files may be missing in the report since the maximum number of extracted files was reached during the analysis. You can increase the limit in the configuration settings.
The overall sleep time of all monitored processes was truncated from "1 minute" to "20 seconds" to reveal dormant functionality.
The operating system was rebooted during the analysis.
Top Threat Indicators (View all 550 threat indicators)
|File System||Encrypts content of user files||Ransomware|
|OS||Modifies system security configuration||-|
|Persistence||Installs system startup script or application||-|
|Creation Time||2018-09-23 21:12 (UTC+2)|
|Number of Monitored Processes||3|
|Dynamic Analyzer Build Date||2018-07-24 20:08 (UTC+2)|
|Dynamic Analyzer Version||2.4.0|
|Static Analyzer Version||1.0.0|
|VTI Ruleset Version||3.0|
|YARA Built-in Ruleset Version||1.0|
|Analysis Report Layout Version||3|