VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Ransomware
|
Threat Names: |
Gen:Heur.Ransom.Imps.1
Trojan.Agent.ECPZ
Mal/Generic-S
|
rvkjfc.exe
Windows Exe (x86-32)
Created at 2020-03-04T17:05:00
Remarks
(0x0200001E): The maximum size of extracted files was exceeded. Some files may be missing in the report.
(0x0200001D): The maximum number of extracted files was exceeded. Some files may be missing in the report.
Master Boot Record Changes
»
Sector Number | Sector Size | Actions |
---|---|---|
2063 | 512 Bytes |
...
|
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\rvkjfc.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x406d37 |
Size Of Code | 0x27000 |
Size Of Initialized Data | 0x1000 |
Size Of Uninitialized Data | 0x3b000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_cui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2019-11-17 12:54:30+00:00 |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
UPX0 | 0x401000 | 0x3b000 | 0x3b000 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 6.6 |
UPX1 | 0x43c000 | 0x27000 | 0x26600 | 0x3b400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.9 |
UPX2 | 0x463000 | 0x1000 | 0x200 | 0x61a00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.11 |
.imports | 0x464000 | 0x1000 | 0x1000 | 0x61c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.43 |
.reloc | 0x465000 | 0x4000 | 0x3e00 | 0x62c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 6.58 |
Imports (7)
»
KERNEL32.DLL (142)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
FindFirstFileW | 0x0 | 0x43b08c | 0x3b08c | 0x3a48c | 0x0 |
FindNextFileW | 0x0 | 0x43b090 | 0x3b090 | 0x3a490 | 0x0 |
FindClose | 0x0 | 0x43b094 | 0x3b094 | 0x3a494 | 0x0 |
GetSystemTime | 0x0 | 0x43b098 | 0x3b098 | 0x3a498 | 0x0 |
ReadFile | 0x0 | 0x43b09c | 0x3b09c | 0x3a49c | 0x0 |
GetFileSizeEx | 0x0 | 0x43b0a0 | 0x3b0a0 | 0x3a4a0 | 0x0 |
LockFile | 0x0 | 0x43b0a4 | 0x3b0a4 | 0x3a4a4 | 0x0 |
SetFilePointer | 0x0 | 0x43b0a8 | 0x3b0a8 | 0x3a4a8 | 0x0 |
SetFileAttributesW | 0x0 | 0x43b0ac | 0x3b0ac | 0x3a4ac | 0x0 |
UnlockFile | 0x0 | 0x43b0b0 | 0x3b0b0 | 0x3a4b0 | 0x0 |
GetDriveTypeW | 0x0 | 0x43b0b4 | 0x3b0b4 | 0x3a4b4 | 0x0 |
MoveFileExW | 0x0 | 0x43b0b8 | 0x3b0b8 | 0x3a4b8 | 0x0 |
GetSystemInfo | 0x0 | 0x43b0bc | 0x3b0bc | 0x3a4bc | 0x0 |
CloseHandle | 0x0 | 0x43b0c0 | 0x3b0c0 | 0x3a4c0 | 0x0 |
UnregisterWaitEx | 0x0 | 0x43b0c4 | 0x3b0c4 | 0x3a4c4 | 0x0 |
QueryDepthSList | 0x0 | 0x43b0c8 | 0x3b0c8 | 0x3a4c8 | 0x0 |
InterlockedPopEntrySList | 0x0 | 0x43b0cc | 0x3b0cc | 0x3a4cc | 0x0 |
OpenMutexW | 0x0 | 0x43b0d0 | 0x3b0d0 | 0x3a4d0 | 0x0 |
lstrcpyW | 0x0 | 0x43b0d4 | 0x3b0d4 | 0x3a4d4 | 0x0 |
GetConsoleWindow | 0x0 | 0x43b0d8 | 0x3b0d8 | 0x3a4d8 | 0x0 |
WideCharToMultiByte | 0x0 | 0x43b0dc | 0x3b0dc | 0x3a4dc | 0x0 |
CopyFileW | 0x0 | 0x43b0e0 | 0x3b0e0 | 0x3a4e0 | 0x0 |
CreateProcessW | 0x0 | 0x43b0e4 | 0x3b0e4 | 0x3a4e4 | 0x0 |
HeapAlloc | 0x0 | 0x43b0e8 | 0x3b0e8 | 0x3a4e8 | 0x0 |
GetProcessHeap | 0x0 | 0x43b0ec | 0x3b0ec | 0x3a4ec | 0x0 |
ExitProcess | 0x0 | 0x43b0f0 | 0x3b0f0 | 0x3a4f0 | 0x0 |
LocalFree | 0x0 | 0x43b0f4 | 0x3b0f4 | 0x3a4f4 | 0x0 |
GetWindowsDirectoryW | 0x0 | 0x43b0f8 | 0x3b0f8 | 0x3a4f8 | 0x0 |
SetFilePointerEx | 0x0 | 0x43b0fc | 0x3b0fc | 0x3a4fc | 0x0 |
lstrcpyA | 0x0 | 0x43b100 | 0x3b100 | 0x3a500 | 0x0 |
lstrcatW | 0x0 | 0x43b104 | 0x3b104 | 0x3a504 | 0x0 |
OutputDebugStringW | 0x0 | 0x43b108 | 0x3b108 | 0x3a508 | 0x0 |
GetLastError | 0x0 | 0x43b10c | 0x3b10c | 0x3a50c | 0x0 |
Sleep | 0x0 | 0x43b110 | 0x3b110 | 0x3a510 | 0x0 |
GetLogicalDriveStringsW | 0x0 | 0x43b114 | 0x3b114 | 0x3a514 | 0x0 |
lstrcatA | 0x0 | 0x43b118 | 0x3b118 | 0x3a518 | 0x0 |
CreateFileW | 0x0 | 0x43b11c | 0x3b11c | 0x3a51c | 0x0 |
LocalAlloc | 0x0 | 0x43b120 | 0x3b120 | 0x3a520 | 0x0 |
lstrlenA | 0x0 | 0x43b124 | 0x3b124 | 0x3a524 | 0x0 |
CreateMutexW | 0x0 | 0x43b128 | 0x3b128 | 0x3a528 | 0x0 |
GetModuleFileNameW | 0x0 | 0x43b12c | 0x3b12c | 0x3a52c | 0x0 |
VirtualAlloc | 0x0 | 0x43b130 | 0x3b130 | 0x3a530 | 0x0 |
Wow64DisableWow64FsRedirection | 0x0 | 0x43b134 | 0x3b134 | 0x3a534 | 0x0 |
ReleaseSemaphore | 0x0 | 0x43b138 | 0x3b138 | 0x3a538 | 0x0 |
VirtualProtect | 0x0 | 0x43b13c | 0x3b13c | 0x3a53c | 0x0 |
GetVersionExW | 0x0 | 0x43b140 | 0x3b140 | 0x3a540 | 0x0 |
GetModuleHandleA | 0x0 | 0x43b144 | 0x3b144 | 0x3a544 | 0x0 |
GetThreadTimes | 0x0 | 0x43b148 | 0x3b148 | 0x3a548 | 0x0 |
UnregisterWait | 0x0 | 0x43b14c | 0x3b14c | 0x3a54c | 0x0 |
RegisterWaitForSingleObject | 0x0 | 0x43b150 | 0x3b150 | 0x3a550 | 0x0 |
SetThreadAffinityMask | 0x0 | 0x43b154 | 0x3b154 | 0x3a554 | 0x0 |
GetProcessAffinityMask | 0x0 | 0x43b158 | 0x3b158 | 0x3a558 | 0x0 |
GetNumaHighestNodeNumber | 0x0 | 0x43b15c | 0x3b15c | 0x3a55c | 0x0 |
DeleteTimerQueueTimer | 0x0 | 0x43b160 | 0x3b160 | 0x3a560 | 0x0 |
WriteFile | 0x0 | 0x43b164 | 0x3b164 | 0x3a564 | 0x0 |
lstrlenW | 0x0 | 0x43b168 | 0x3b168 | 0x3a568 | 0x0 |
GetCurrentProcess | 0x0 | 0x43b16c | 0x3b16c | 0x3a56c | 0x0 |
VirtualFree | 0x0 | 0x43b170 | 0x3b170 | 0x3a570 | 0x0 |
SetPriorityClass | 0x0 | 0x43b174 | 0x3b174 | 0x3a574 | 0x0 |
HeapFree | 0x0 | 0x43b178 | 0x3b178 | 0x3a578 | 0x0 |
LoadLibraryW | 0x0 | 0x43b17c | 0x3b17c | 0x3a57c | 0x0 |
GetVolumeInformationW | 0x0 | 0x43b180 | 0x3b180 | 0x3a580 | 0x0 |
EnterCriticalSection | 0x0 | 0x43b184 | 0x3b184 | 0x3a584 | 0x0 |
LeaveCriticalSection | 0x0 | 0x43b188 | 0x3b188 | 0x3a588 | 0x0 |
DeleteCriticalSection | 0x0 | 0x43b18c | 0x3b18c | 0x3a58c | 0x0 |
SetEvent | 0x0 | 0x43b190 | 0x3b190 | 0x3a590 | 0x0 |
ResetEvent | 0x0 | 0x43b194 | 0x3b194 | 0x3a594 | 0x0 |
WaitForSingleObjectEx | 0x0 | 0x43b198 | 0x3b198 | 0x3a598 | 0x0 |
CreateEventW | 0x0 | 0x43b19c | 0x3b19c | 0x3a59c | 0x0 |
GetModuleHandleW | 0x0 | 0x43b1a0 | 0x3b1a0 | 0x3a5a0 | 0x0 |
GetProcAddress | 0x0 | 0x43b1a4 | 0x3b1a4 | 0x3a5a4 | 0x0 |
IsDebuggerPresent | 0x0 | 0x43b1a8 | 0x3b1a8 | 0x3a5a8 | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x43b1ac | 0x3b1ac | 0x3a5ac | 0x0 |
SetUnhandledExceptionFilter | 0x0 | 0x43b1b0 | 0x3b1b0 | 0x3a5b0 | 0x0 |
GetStartupInfoW | 0x0 | 0x43b1b4 | 0x3b1b4 | 0x3a5b4 | 0x0 |
IsProcessorFeaturePresent | 0x0 | 0x43b1b8 | 0x3b1b8 | 0x3a5b8 | 0x0 |
QueryPerformanceCounter | 0x0 | 0x43b1bc | 0x3b1bc | 0x3a5bc | 0x0 |
GetCurrentProcessId | 0x0 | 0x43b1c0 | 0x3b1c0 | 0x3a5c0 | 0x0 |
GetCurrentThreadId | 0x0 | 0x43b1c4 | 0x3b1c4 | 0x3a5c4 | 0x0 |
GetSystemTimeAsFileTime | 0x0 | 0x43b1c8 | 0x3b1c8 | 0x3a5c8 | 0x0 |
InitializeSListHead | 0x0 | 0x43b1cc | 0x3b1cc | 0x3a5cc | 0x0 |
TerminateProcess | 0x0 | 0x43b1d0 | 0x3b1d0 | 0x3a5d0 | 0x0 |
MultiByteToWideChar | 0x0 | 0x43b1d4 | 0x3b1d4 | 0x3a5d4 | 0x0 |
GetStringTypeW | 0x0 | 0x43b1d8 | 0x3b1d8 | 0x3a5d8 | 0x0 |
TryEnterCriticalSection | 0x0 | 0x43b1dc | 0x3b1dc | 0x3a5dc | 0x0 |
DuplicateHandle | 0x0 | 0x43b1e0 | 0x3b1e0 | 0x3a5e0 | 0x0 |
GetCurrentThread | 0x0 | 0x43b1e4 | 0x3b1e4 | 0x3a5e4 | 0x0 |
GetExitCodeThread | 0x0 | 0x43b1e8 | 0x3b1e8 | 0x3a5e8 | 0x0 |
SetLastError | 0x0 | 0x43b1ec | 0x3b1ec | 0x3a5ec | 0x0 |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x43b1f0 | 0x3b1f0 | 0x3a5f0 | 0x0 |
TlsAlloc | 0x0 | 0x43b1f4 | 0x3b1f4 | 0x3a5f4 | 0x0 |
TlsGetValue | 0x0 | 0x43b1f8 | 0x3b1f8 | 0x3a5f8 | 0x0 |
TlsSetValue | 0x0 | 0x43b1fc | 0x3b1fc | 0x3a5fc | 0x0 |
TlsFree | 0x0 | 0x43b200 | 0x3b200 | 0x3a600 | 0x0 |
GetTickCount | 0x0 | 0x43b204 | 0x3b204 | 0x3a604 | 0x0 |
EncodePointer | 0x0 | 0x43b208 | 0x3b208 | 0x3a608 | 0x0 |
DecodePointer | 0x0 | 0x43b20c | 0x3b20c | 0x3a60c | 0x0 |
CompareStringW | 0x0 | 0x43b210 | 0x3b210 | 0x3a610 | 0x0 |
LCMapStringW | 0x0 | 0x43b214 | 0x3b214 | 0x3a614 | 0x0 |
GetLocaleInfoW | 0x0 | 0x43b218 | 0x3b218 | 0x3a618 | 0x0 |
GetCPInfo | 0x0 | 0x43b21c | 0x3b21c | 0x3a61c | 0x0 |
FreeLibrary | 0x0 | 0x43b220 | 0x3b220 | 0x3a620 | 0x0 |
LoadLibraryExW | 0x0 | 0x43b224 | 0x3b224 | 0x3a624 | 0x0 |
RaiseException | 0x0 | 0x43b228 | 0x3b228 | 0x3a628 | 0x0 |
RtlUnwind | 0x0 | 0x43b22c | 0x3b22c | 0x3a62c | 0x0 |
InterlockedPushEntrySList | 0x0 | 0x43b230 | 0x3b230 | 0x3a630 | 0x0 |
InterlockedFlushSList | 0x0 | 0x43b234 | 0x3b234 | 0x3a634 | 0x0 |
GetModuleHandleExW | 0x0 | 0x43b238 | 0x3b238 | 0x3a638 | 0x0 |
GetModuleFileNameA | 0x0 | 0x43b23c | 0x3b23c | 0x3a63c | 0x0 |
GetStdHandle | 0x0 | 0x43b240 | 0x3b240 | 0x3a640 | 0x0 |
GetCommandLineA | 0x0 | 0x43b244 | 0x3b244 | 0x3a644 | 0x0 |
GetCommandLineW | 0x0 | 0x43b248 | 0x3b248 | 0x3a648 | 0x0 |
GetACP | 0x0 | 0x43b24c | 0x3b24c | 0x3a64c | 0x0 |
CreateThread | 0x0 | 0x43b250 | 0x3b250 | 0x3a650 | 0x0 |
ExitThread | 0x0 | 0x43b254 | 0x3b254 | 0x3a654 | 0x0 |
FreeLibraryAndExitThread | 0x0 | 0x43b258 | 0x3b258 | 0x3a658 | 0x0 |
HeapReAlloc | 0x0 | 0x43b25c | 0x3b25c | 0x3a65c | 0x0 |
GetFileType | 0x0 | 0x43b260 | 0x3b260 | 0x3a660 | 0x0 |
IsValidLocale | 0x0 | 0x43b264 | 0x3b264 | 0x3a664 | 0x0 |
GetUserDefaultLCID | 0x0 | 0x43b268 | 0x3b268 | 0x3a668 | 0x0 |
EnumSystemLocalesW | 0x0 | 0x43b26c | 0x3b26c | 0x3a66c | 0x0 |
FindFirstFileExA | 0x0 | 0x43b270 | 0x3b270 | 0x3a670 | 0x0 |
FindNextFileA | 0x0 | 0x43b274 | 0x3b274 | 0x3a674 | 0x0 |
IsValidCodePage | 0x0 | 0x43b278 | 0x3b278 | 0x3a678 | 0x0 |
GetOEMCP | 0x0 | 0x43b27c | 0x3b27c | 0x3a67c | 0x0 |
GetEnvironmentStringsW | 0x0 | 0x43b280 | 0x3b280 | 0x3a680 | 0x0 |
FreeEnvironmentStringsW | 0x0 | 0x43b284 | 0x3b284 | 0x3a684 | 0x0 |
SetEnvironmentVariableA | 0x0 | 0x43b288 | 0x3b288 | 0x3a688 | 0x0 |
SetStdHandle | 0x0 | 0x43b28c | 0x3b28c | 0x3a68c | 0x0 |
HeapSize | 0x0 | 0x43b290 | 0x3b290 | 0x3a690 | 0x0 |
FlushFileBuffers | 0x0 | 0x43b294 | 0x3b294 | 0x3a694 | 0x0 |
GetConsoleCP | 0x0 | 0x43b298 | 0x3b298 | 0x3a698 | 0x0 |
GetConsoleMode | 0x0 | 0x43b29c | 0x3b29c | 0x3a69c | 0x0 |
WriteConsoleW | 0x0 | 0x43b2a0 | 0x3b2a0 | 0x3a6a0 | 0x0 |
CreateTimerQueue | 0x0 | 0x43b2a4 | 0x3b2a4 | 0x3a6a4 | 0x0 |
SignalObjectAndWait | 0x0 | 0x43b2a8 | 0x3b2a8 | 0x3a6a8 | 0x0 |
SwitchToThread | 0x0 | 0x43b2ac | 0x3b2ac | 0x3a6ac | 0x0 |
SetThreadPriority | 0x0 | 0x43b2b0 | 0x3b2b0 | 0x3a6b0 | 0x0 |
GetThreadPriority | 0x0 | 0x43b2b4 | 0x3b2b4 | 0x3a6b4 | 0x0 |
GetLogicalProcessorInformation | 0x0 | 0x43b2b8 | 0x3b2b8 | 0x3a6b8 | 0x0 |
CreateTimerQueueTimer | 0x0 | 0x43b2bc | 0x3b2bc | 0x3a6bc | 0x0 |
ChangeTimerQueueTimer | 0x0 | 0x43b2c0 | 0x3b2c0 | 0x3a6c0 | 0x0 |
ADVAPI32.dll (14)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CryptEncrypt | 0x0 | 0x43b000 | 0x3b000 | 0x3a400 | 0x0 |
CryptReleaseContext | 0x0 | 0x43b004 | 0x3b004 | 0x3a404 | 0x0 |
RegQueryValueExW | 0x0 | 0x43b008 | 0x3b008 | 0x3a408 | 0x0 |
CryptGenKey | 0x0 | 0x43b00c | 0x3b00c | 0x3a40c | 0x0 |
RegOpenKeyW | 0x0 | 0x43b010 | 0x3b010 | 0x3a410 | 0x0 |
GetUserNameW | 0x0 | 0x43b014 | 0x3b014 | 0x3a414 | 0x0 |
RegOpenKeyExW | 0x0 | 0x43b018 | 0x3b018 | 0x3a418 | 0x0 |
CryptDestroyKey | 0x0 | 0x43b01c | 0x3b01c | 0x3a41c | 0x0 |
RegCloseKey | 0x0 | 0x43b020 | 0x3b020 | 0x3a420 | 0x0 |
CryptAcquireContextW | 0x0 | 0x43b024 | 0x3b024 | 0x3a424 | 0x0 |
SystemFunction036 | 0x0 | 0x43b028 | 0x3b028 | 0x3a428 | 0x0 |
CryptGenRandom | 0x0 | 0x43b02c | 0x3b02c | 0x3a42c | 0x0 |
CryptExportKey | 0x0 | 0x43b030 | 0x3b030 | 0x3a430 | 0x0 |
RegSetValueExW | 0x0 | 0x43b034 | 0x3b034 | 0x3a434 | 0x0 |
CRYPT32.dll (7)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CryptDecodeObjectEx | 0x0 | 0x43b03c | 0x3b03c | 0x3a43c | 0x0 |
CryptExportPublicKeyInfo | 0x0 | 0x43b040 | 0x3b040 | 0x3a440 | 0x0 |
CryptEncodeObject | 0x0 | 0x43b044 | 0x3b044 | 0x3a444 | 0x0 |
CryptEncodeObjectEx | 0x0 | 0x43b048 | 0x3b048 | 0x3a448 | 0x0 |
CryptImportPublicKeyInfo | 0x0 | 0x43b04c | 0x3b04c | 0x3a44c | 0x0 |
CryptStringToBinaryW | 0x0 | 0x43b050 | 0x3b050 | 0x3a450 | 0x0 |
CryptBinaryToStringW | 0x0 | 0x43b054 | 0x3b054 | 0x3a454 | 0x0 |
GDI32.dll (11)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CreateCompatibleDC | 0x0 | 0x43b05c | 0x3b05c | 0x3a45c | 0x0 |
BitBlt | 0x0 | 0x43b060 | 0x3b060 | 0x3a460 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x43b064 | 0x3b064 | 0x3a464 | 0x0 |
SelectObject | 0x0 | 0x43b068 | 0x3b068 | 0x3a468 | 0x0 |
CreateDIBSection | 0x0 | 0x43b06c | 0x3b06c | 0x3a46c | 0x0 |
CreateFontW | 0x0 | 0x43b070 | 0x3b070 | 0x3a470 | 0x0 |
DeleteDC | 0x0 | 0x43b074 | 0x3b074 | 0x3a474 | 0x0 |
GetTextExtentPoint32W | 0x0 | 0x43b078 | 0x3b078 | 0x3a478 | 0x0 |
SetTextColor | 0x0 | 0x43b07c | 0x3b07c | 0x3a47c | 0x0 |
SetBkMode | 0x0 | 0x43b080 | 0x3b080 | 0x3a480 | 0x0 |
DeleteObject | 0x0 | 0x43b084 | 0x3b084 | 0x3a484 | 0x0 |
MPR.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WNetCloseEnum | 0x0 | 0x43b2c8 | 0x3b2c8 | 0x3a6c8 | 0x0 |
WNetEnumResourceW | 0x0 | 0x43b2cc | 0x3b2cc | 0x3a6cc | 0x0 |
WNetOpenEnumW | 0x0 | 0x43b2d0 | 0x3b2d0 | 0x3a6d0 | 0x0 |
USER32.dll (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SystemParametersInfoW | 0x0 | 0x43b2d8 | 0x3b2d8 | 0x3a6d8 | 0x0 |
DrawTextW | 0x0 | 0x43b2dc | 0x3b2dc | 0x3a6dc | 0x0 |
wsprintfW | 0x0 | 0x43b2e0 | 0x3b2e0 | 0x3a6e0 | 0x0 |
ShowWindow | 0x0 | 0x43b2e4 | 0x3b2e4 | 0x3a6e4 | 0x0 |
GetDC | 0x0 | 0x43b2e8 | 0x3b2e8 | 0x3a6e8 | 0x0 |
ReleaseDC | 0x0 | 0x43b2ec | 0x3b2ec | 0x3a6ec | 0x0 |
WININET.dll (7)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
InternetConnectW | 0x0 | 0x43b2f4 | 0x3b2f4 | 0x3a6f4 | 0x0 |
InternetCloseHandle | 0x0 | 0x43b2f8 | 0x3b2f8 | 0x3a6f8 | 0x0 |
HttpSendRequestW | 0x0 | 0x43b2fc | 0x3b2fc | 0x3a6fc | 0x0 |
HttpOpenRequestW | 0x0 | 0x43b300 | 0x3b300 | 0x3a700 | 0x0 |
InternetOpenW | 0x0 | 0x43b304 | 0x3b304 | 0x3a704 | 0x0 |
HttpQueryInfoW | 0x0 | 0x43b308 | 0x3b308 | 0x3a708 | 0x0 |
InternetReadFile | 0x0 | 0x43b30c | 0x3b30c | 0x3a70c | 0x0 |
Memory Dumps (23)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | First Execution |
![]() |
32-bit | 0x01216D37 |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x01219E9C |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x01213090 |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x01225ABF |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x01220ADB |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x01212D10 |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x01218AF3 |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x0122E0E0 |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x012430B7 |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x01215220 |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x01214A20 |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x01242550 |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x012482D0 |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x01225ABF |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x012477A0 |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x0121EC1D |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x012490C2 |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x01213F50 |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x01242150 |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x01213F50 |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x01242150 |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Final Dump |
![]() |
32-bit | - |
![]() |
![]() |
...
|
rvkjfc.exe | 1 | 0x01210000 | 0x01278FFF | Content Changed |
![]() |
32-bit | 0x01211FE0 |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Heur.Ransom.Imps.1 |
Malicious
|
C:\\Boot\BCD.LOG1.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\Boot\BOOTSTAT.DAT.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\$Recycle.Bin\S-1-5-21-3388679973-3930757225-3770151564-1000\desktop.ini | Modified File | Stream |
Unknown
|
...
|
»
C:\\Recovery\e9e23962-4a25-11e7-88e8-91fb2ec43f0b\boot.sdi.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\Recovery\e9e23962-4a25-11e7-88e8-91fb2ec43f0b\Winre.wim.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | WIM |
Unknown
|
...
|
»
C:\\Users\5p5NrGJn0jS HALPmcxz\ntuser.ini.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\Users\Public\desktop.ini.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelLR.cab | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.msi | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.msi | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PptLR.cab | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\Setup.xml.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.msi.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PubLR.cab | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlkLR.cab | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlookMUI.msi.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlookMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\Setup.xml.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordLR.cab.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordMUI.msi.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordMUI.xml.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proofing.msi.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proofing.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Office32MUI.msi.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Office32MUI.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\OWOW32LR.cab | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Setup.xml.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\InfLR.cab | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\InfoPathMUI.msi | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\InfoPathMUI.xml.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\Setup.xml.12781717671972521061.Ad_finem@tutanota.com.ONIX | Dropped File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0054-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\\MSOCache\All Users\{90140000-0054-0409-1000-0000000FF1CE}-C\VisioLR.cab | Modified File | Stream |
Unknown
|
...
|
»
C:\\Users\5p5NrGJn0jS HALPmcxz\Documents\TRY_TO_READ.html | Dropped File | Text |
Unknown
|
...
|
»