VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: | - |
Threat Names: |
DeepScan:Generic.Ransom.Fonix.2.57D59D3A
DeepScan:Generic.Ransom.Fonix.2.7637E1D3
Gen:Variant.Ulise.156743
|
26SDlxCbvJlumPMe.exe
Windows Exe (x86-64)
Created at 2021-01-24T23:30:00
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\26SDlxCbvJlumPMe.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x472a74 |
Size Of Code | 0xcbc00 |
Size Of Initialized Data | 0x6c800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_cui |
Machine Type | MachineType.amd64 |
Compile Timestamp | 2021-01-22 15:55:46+00:00 |
Sections (7)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0xcbaa4 | 0xcbc00 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x4cd000 | 0x53b00 | 0x53c00 | 0xcc000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.45 |
.data | 0x521000 | 0xbd4c | 0x8a00 | 0x11fc00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.87 |
.pdata | 0x52d000 | 0x9dd4 | 0x9e00 | 0x128600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.97 |
_RDATA | 0x537000 | 0x94 | 0x200 | 0x132400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 1.43 |
.rsrc | 0x538000 | 0x1e0 | 0x200 | 0x132600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.71 |
.reloc | 0x539000 | 0x2ba0 | 0x2c00 | 0x132800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 5.45 |
Imports (7)
»
KERNEL32.dll (149)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SetThreadPriority | 0x0 | 0x4cd038 | 0x11f920 | 0x11e920 | 0x56b |
CreateMutexW | 0x0 | 0x4cd040 | 0x11f928 | 0x11e928 | 0xda |
InitializeCriticalSectionEx | 0x0 | 0x4cd048 | 0x11f930 | 0x11e930 | 0x369 |
FindClose | 0x0 | 0x4cd050 | 0x11f938 | 0x11e938 | 0x17b |
LocalAlloc | 0x0 | 0x4cd058 | 0x11f940 | 0x11e940 | 0x3cd |
ReleaseMutex | 0x0 | 0x4cd060 | 0x11f948 | 0x11e948 | 0x4b4 |
GetLocaleInfoA | 0x0 | 0x4cd068 | 0x11f950 | 0x11e950 | 0x269 |
OpenProcess | 0x0 | 0x4cd070 | 0x11f958 | 0x11e958 | 0x410 |
SetFileAttributesW | 0x0 | 0x4cd078 | 0x11f960 | 0x11e960 | 0x52b |
CreateToolhelp32Snapshot | 0x0 | 0x4cd080 | 0x11f968 | 0x11e968 | 0xfb |
Sleep | 0x0 | 0x4cd088 | 0x11f970 | 0x11e970 | 0x58b |
FormatMessageW | 0x0 | 0x4cd090 | 0x11f978 | 0x11e978 | 0x1ad |
CopyFileA | 0x0 | 0x4cd098 | 0x11f980 | 0x11e980 | 0xa8 |
GetLastError | 0x0 | 0x4cd0a0 | 0x11f988 | 0x11e988 | 0x267 |
Process32NextW | 0x0 | 0x4cd0a8 | 0x11f990 | 0x11e990 | 0x431 |
DeleteFileA | 0x0 | 0x4cd0b0 | 0x11f998 | 0x11e998 | 0x113 |
Process32FirstW | 0x0 | 0x4cd0b8 | 0x11f9a0 | 0x11e9a0 | 0x42f |
CloseHandle | 0x0 | 0x4cd0c0 | 0x11f9a8 | 0x11e9a8 | 0x86 |
RaiseException | 0x0 | 0x4cd0c8 | 0x11f9b0 | 0x11e9b0 | 0x466 |
DecodePointer | 0x0 | 0x4cd0d0 | 0x11f9b8 | 0x11e9b8 | 0x10a |
GetDriveTypeA | 0x0 | 0x4cd0d8 | 0x11f9c0 | 0x11e9c0 | 0x235 |
LocalFree | 0x0 | 0x4cd0e0 | 0x11f9c8 | 0x11e9c8 | 0x3d2 |
DeleteCriticalSection | 0x0 | 0x4cd0e8 | 0x11f9d0 | 0x11e9d0 | 0x111 |
CopyFileW | 0x0 | 0x4cd0f0 | 0x11f9d8 | 0x11e9d8 | 0xad |
WideCharToMultiByte | 0x0 | 0x4cd0f8 | 0x11f9e0 | 0x11e9e0 | 0x60d |
GetConsoleWindow | 0x0 | 0x4cd100 | 0x11f9e8 | 0x11e9e8 | 0x20d |
GetDiskFreeSpaceExA | 0x0 | 0x4cd108 | 0x11f9f0 | 0x11e9f0 | 0x22e |
OpenMutexW | 0x0 | 0x4cd110 | 0x11f9f8 | 0x11e9f8 | 0x40c |
GetDriveTypeW | 0x0 | 0x4cd118 | 0x11fa00 | 0x11ea00 | 0x236 |
SetLastError | 0x0 | 0x4cd120 | 0x11fa08 | 0x11ea08 | 0x53f |
QueryPerformanceCounter | 0x0 | 0x4cd128 | 0x11fa10 | 0x11ea10 | 0x450 |
QueryPerformanceFrequency | 0x0 | 0x4cd130 | 0x11fa18 | 0x11ea18 | 0x451 |
GetCurrentThread | 0x0 | 0x4cd138 | 0x11fa20 | 0x11ea20 | 0x221 |
GetThreadTimes | 0x0 | 0x4cd140 | 0x11fa28 | 0x11ea28 | 0x30c |
SetEndOfFile | 0x0 | 0x4cd148 | 0x11fa30 | 0x11ea30 | 0x51e |
WriteConsoleW | 0x0 | 0x4cd150 | 0x11fa38 | 0x11ea38 | 0x620 |
CreateFileW | 0x0 | 0x4cd158 | 0x11fa40 | 0x11ea40 | 0xcb |
SetStdHandle | 0x0 | 0x4cd160 | 0x11fa48 | 0x11ea48 | 0x557 |
GetProcessHeap | 0x0 | 0x4cd168 | 0x11fa50 | 0x11ea50 | 0x2bb |
SetEnvironmentVariableW | 0x0 | 0x4cd170 | 0x11fa58 | 0x11ea58 | 0x522 |
FreeEnvironmentStringsW | 0x0 | 0x4cd178 | 0x11fa60 | 0x11ea60 | 0x1b0 |
TerminateProcess | 0x0 | 0x4cd180 | 0x11fa68 | 0x11ea68 | 0x59a |
GetCurrentProcess | 0x0 | 0x4cd188 | 0x11fa70 | 0x11ea70 | 0x21d |
FindNextFileW | 0x0 | 0x4cd190 | 0x11fa78 | 0x11ea78 | 0x192 |
SetPriorityClass | 0x0 | 0x4cd198 | 0x11fa80 | 0x11ea80 | 0x549 |
FindFirstFileW | 0x0 | 0x4cd1a0 | 0x11fa88 | 0x11ea88 | 0x186 |
SetThreadPriorityBoost | 0x0 | 0x4cd1a8 | 0x11fa90 | 0x11ea90 | 0x56c |
SetProcessPriorityBoost | 0x0 | 0x4cd1b0 | 0x11fa98 | 0x11ea98 | 0x551 |
GetEnvironmentStringsW | 0x0 | 0x4cd1b8 | 0x11faa0 | 0x11eaa0 | 0x23e |
GetOEMCP | 0x0 | 0x4cd1c0 | 0x11faa8 | 0x11eaa8 | 0x29e |
GetACP | 0x0 | 0x4cd1c8 | 0x11fab0 | 0x11eab0 | 0x1b8 |
IsValidCodePage | 0x0 | 0x4cd1d0 | 0x11fab8 | 0x11eab8 | 0x38e |
FindFirstFileExW | 0x0 | 0x4cd1d8 | 0x11fac0 | 0x11eac0 | 0x181 |
HeapSize | 0x0 | 0x4cd1e0 | 0x11fac8 | 0x11eac8 | 0x357 |
HeapReAlloc | 0x0 | 0x4cd1e8 | 0x11fad0 | 0x11ead0 | 0x355 |
ReadConsoleW | 0x0 | 0x4cd1f0 | 0x11fad8 | 0x11ead8 | 0x474 |
ReadFile | 0x0 | 0x4cd1f8 | 0x11fae0 | 0x11eae0 | 0x477 |
GetFileAttributesExW | 0x0 | 0x4cd200 | 0x11fae8 | 0x11eae8 | 0x249 |
CreateProcessW | 0x0 | 0x4cd208 | 0x11faf0 | 0x11eaf0 | 0xe5 |
GetExitCodeProcess | 0x0 | 0x4cd210 | 0x11faf8 | 0x11eaf8 | 0x243 |
GetConsoleMode | 0x0 | 0x4cd218 | 0x11fb00 | 0x11eb00 | 0x202 |
GetConsoleCP | 0x0 | 0x4cd220 | 0x11fb08 | 0x11eb08 | 0x1f0 |
FlushFileBuffers | 0x0 | 0x4cd228 | 0x11fb10 | 0x11eb10 | 0x1a5 |
MultiByteToWideChar | 0x0 | 0x4cd230 | 0x11fb18 | 0x11eb18 | 0x3f2 |
GetStringTypeW | 0x0 | 0x4cd238 | 0x11fb20 | 0x11eb20 | 0x2de |
EnterCriticalSection | 0x0 | 0x4cd240 | 0x11fb28 | 0x11eb28 | 0x135 |
LeaveCriticalSection | 0x0 | 0x4cd248 | 0x11fb30 | 0x11eb30 | 0x3c0 |
TryEnterCriticalSection | 0x0 | 0x4cd250 | 0x11fb38 | 0x11eb38 | 0x5b5 |
GetCurrentThreadId | 0x0 | 0x4cd258 | 0x11fb40 | 0x11eb40 | 0x222 |
WaitForSingleObjectEx | 0x0 | 0x4cd260 | 0x11fb48 | 0x11eb48 | 0x5e7 |
SwitchToThread | 0x0 | 0x4cd268 | 0x11fb50 | 0x11eb50 | 0x595 |
EncodePointer | 0x0 | 0x4cd270 | 0x11fb58 | 0x11eb58 | 0x131 |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x4cd278 | 0x11fb60 | 0x11eb60 | 0x368 |
CreateEventW | 0x0 | 0x4cd280 | 0x11fb68 | 0x11eb68 | 0xbf |
TlsAlloc | 0x0 | 0x4cd288 | 0x11fb70 | 0x11eb70 | 0x5ac |
TlsGetValue | 0x0 | 0x4cd290 | 0x11fb78 | 0x11eb78 | 0x5ae |
TlsSetValue | 0x0 | 0x4cd298 | 0x11fb80 | 0x11eb80 | 0x5af |
TlsFree | 0x0 | 0x4cd2a0 | 0x11fb88 | 0x11eb88 | 0x5ad |
GetSystemTimeAsFileTime | 0x0 | 0x4cd2a8 | 0x11fb90 | 0x11eb90 | 0x2f0 |
GetTickCount | 0x0 | 0x4cd2b0 | 0x11fb98 | 0x11eb98 | 0x30e |
GetModuleHandleW | 0x0 | 0x4cd2b8 | 0x11fba0 | 0x11eba0 | 0x27e |
GetProcAddress | 0x0 | 0x4cd2c0 | 0x11fba8 | 0x11eba8 | 0x2b5 |
CompareStringW | 0x0 | 0x4cd2c8 | 0x11fbb0 | 0x11ebb0 | 0x9b |
LCMapStringW | 0x0 | 0x4cd2d0 | 0x11fbb8 | 0x11ebb8 | 0x3b4 |
GetLocaleInfoW | 0x0 | 0x4cd2d8 | 0x11fbc0 | 0x11ebc0 | 0x26b |
GetCPInfo | 0x0 | 0x4cd2e0 | 0x11fbc8 | 0x11ebc8 | 0x1c7 |
IsDebuggerPresent | 0x0 | 0x4cd2e8 | 0x11fbd0 | 0x11ebd0 | 0x382 |
OutputDebugStringW | 0x0 | 0x4cd2f0 | 0x11fbd8 | 0x11ebd8 | 0x41c |
SetEvent | 0x0 | 0x4cd2f8 | 0x11fbe0 | 0x11ebe0 | 0x524 |
ResetEvent | 0x0 | 0x4cd300 | 0x11fbe8 | 0x11ebe8 | 0x4ca |
InitializeSListHead | 0x0 | 0x4cd308 | 0x11fbf0 | 0x11ebf0 | 0x36c |
RtlCaptureContext | 0x0 | 0x4cd310 | 0x11fbf8 | 0x11ebf8 | 0x4d3 |
RtlLookupFunctionEntry | 0x0 | 0x4cd318 | 0x11fc00 | 0x11ec00 | 0x4da |
RtlVirtualUnwind | 0x0 | 0x4cd320 | 0x11fc08 | 0x11ec08 | 0x4e1 |
UnhandledExceptionFilter | 0x0 | 0x4cd328 | 0x11fc10 | 0x11ec10 | 0x5bc |
SetUnhandledExceptionFilter | 0x0 | 0x4cd330 | 0x11fc18 | 0x11ec18 | 0x57b |
IsProcessorFeaturePresent | 0x0 | 0x4cd338 | 0x11fc20 | 0x11ec20 | 0x389 |
GetStartupInfoW | 0x0 | 0x4cd340 | 0x11fc28 | 0x11ec28 | 0x2d7 |
GetCurrentProcessId | 0x0 | 0x4cd348 | 0x11fc30 | 0x11ec30 | 0x21e |
CreateTimerQueue | 0x0 | 0x4cd350 | 0x11fc38 | 0x11ec38 | 0xf9 |
SignalObjectAndWait | 0x0 | 0x4cd358 | 0x11fc40 | 0x11ec40 | 0x589 |
CreateThread | 0x0 | 0x4cd360 | 0x11fc48 | 0x11ec48 | 0xf2 |
GetThreadPriority | 0x0 | 0x4cd368 | 0x11fc50 | 0x11ec50 | 0x308 |
GetLogicalProcessorInformation | 0x0 | 0x4cd370 | 0x11fc58 | 0x11ec58 | 0x26f |
CreateTimerQueueTimer | 0x0 | 0x4cd378 | 0x11fc60 | 0x11ec60 | 0xfa |
ChangeTimerQueueTimer | 0x0 | 0x4cd380 | 0x11fc68 | 0x11ec68 | 0x78 |
DeleteTimerQueueTimer | 0x0 | 0x4cd388 | 0x11fc70 | 0x11ec70 | 0x11b |
GetNumaHighestNodeNumber | 0x0 | 0x4cd390 | 0x11fc78 | 0x11ec78 | 0x290 |
GetProcessAffinityMask | 0x0 | 0x4cd398 | 0x11fc80 | 0x11ec80 | 0x2b6 |
SetThreadAffinityMask | 0x0 | 0x4cd3a0 | 0x11fc88 | 0x11ec88 | 0x560 |
RegisterWaitForSingleObject | 0x0 | 0x4cd3a8 | 0x11fc90 | 0x11ec90 | 0x4ad |
UnregisterWait | 0x0 | 0x4cd3b0 | 0x11fc98 | 0x11ec98 | 0x5c5 |
FreeLibrary | 0x0 | 0x4cd3b8 | 0x11fca0 | 0x11eca0 | 0x1b1 |
FreeLibraryAndExitThread | 0x0 | 0x4cd3c0 | 0x11fca8 | 0x11eca8 | 0x1b2 |
GetModuleFileNameW | 0x0 | 0x4cd3c8 | 0x11fcb0 | 0x11ecb0 | 0x27a |
GetModuleHandleA | 0x0 | 0x4cd3d0 | 0x11fcb8 | 0x11ecb8 | 0x27b |
LoadLibraryExW | 0x0 | 0x4cd3d8 | 0x11fcc0 | 0x11ecc0 | 0x3c6 |
GetVersionExW | 0x0 | 0x4cd3e0 | 0x11fcc8 | 0x11ecc8 | 0x324 |
VirtualAlloc | 0x0 | 0x4cd3e8 | 0x11fcd0 | 0x11ecd0 | 0x5d5 |
VirtualProtect | 0x0 | 0x4cd3f0 | 0x11fcd8 | 0x11ecd8 | 0x5db |
VirtualFree | 0x0 | 0x4cd3f8 | 0x11fce0 | 0x11ece0 | 0x5d8 |
DuplicateHandle | 0x0 | 0x4cd400 | 0x11fce8 | 0x11ece8 | 0x12f |
ReleaseSemaphore | 0x0 | 0x4cd408 | 0x11fcf0 | 0x11ecf0 | 0x4b8 |
InterlockedPopEntrySList | 0x0 | 0x4cd410 | 0x11fcf8 | 0x11ecf8 | 0x371 |
InterlockedPushEntrySList | 0x0 | 0x4cd418 | 0x11fd00 | 0x11ed00 | 0x372 |
InterlockedFlushSList | 0x0 | 0x4cd420 | 0x11fd08 | 0x11ed08 | 0x370 |
QueryDepthSList | 0x0 | 0x4cd428 | 0x11fd10 | 0x11ed10 | 0x446 |
UnregisterWaitEx | 0x0 | 0x4cd430 | 0x11fd18 | 0x11ed18 | 0x5c6 |
LoadLibraryW | 0x0 | 0x4cd438 | 0x11fd20 | 0x11ed20 | 0x3c7 |
WaitForSingleObject | 0x0 | 0x4cd440 | 0x11fd28 | 0x11ed28 | 0x5e6 |
RtlUnwindEx | 0x0 | 0x4cd448 | 0x11fd30 | 0x11ed30 | 0x4e0 |
RtlPcToFileHeader | 0x0 | 0x4cd450 | 0x11fd38 | 0x11ed38 | 0x4dc |
ExitProcess | 0x0 | 0x4cd458 | 0x11fd40 | 0x11ed40 | 0x164 |
GetModuleHandleExW | 0x0 | 0x4cd460 | 0x11fd48 | 0x11ed48 | 0x27d |
ExitThread | 0x0 | 0x4cd468 | 0x11fd50 | 0x11ed50 | 0x165 |
MoveFileExW | 0x0 | 0x4cd470 | 0x11fd58 | 0x11ed58 | 0x3eb |
GetStdHandle | 0x0 | 0x4cd478 | 0x11fd60 | 0x11ed60 | 0x2d9 |
WriteFile | 0x0 | 0x4cd480 | 0x11fd68 | 0x11ed68 | 0x621 |
GetCommandLineA | 0x0 | 0x4cd488 | 0x11fd70 | 0x11ed70 | 0x1dc |
GetCommandLineW | 0x0 | 0x4cd490 | 0x11fd78 | 0x11ed78 | 0x1dd |
GetFileSizeEx | 0x0 | 0x4cd498 | 0x11fd80 | 0x11ed80 | 0x253 |
SetFilePointerEx | 0x0 | 0x4cd4a0 | 0x11fd88 | 0x11ed88 | 0x531 |
GetFileType | 0x0 | 0x4cd4a8 | 0x11fd90 | 0x11ed90 | 0x255 |
HeapAlloc | 0x0 | 0x4cd4b0 | 0x11fd98 | 0x11ed98 | 0x34e |
HeapFree | 0x0 | 0x4cd4b8 | 0x11fda0 | 0x11eda0 | 0x352 |
IsValidLocale | 0x0 | 0x4cd4c0 | 0x11fda8 | 0x11eda8 | 0x390 |
GetUserDefaultLCID | 0x0 | 0x4cd4c8 | 0x11fdb0 | 0x11edb0 | 0x31b |
EnumSystemLocalesW | 0x0 | 0x4cd4d0 | 0x11fdb8 | 0x11edb8 | 0x159 |
RtlUnwind | 0x0 | 0x4cd4d8 | 0x11fdc0 | 0x11edc0 | 0x4df |
USER32.dll (5)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetKeyboardLayoutList | 0x0 | 0x4cd500 | 0x11fde8 | 0x11ede8 | 0x16a |
ExitWindowsEx | 0x0 | 0x4cd508 | 0x11fdf0 | 0x11edf0 | 0x10f |
ShowWindow | 0x0 | 0x4cd510 | 0x11fdf8 | 0x11edf8 | 0x388 |
MessageBoxW | 0x0 | 0x4cd518 | 0x11fe00 | 0x11ee00 | 0x28a |
SystemParametersInfoW | 0x0 | 0x4cd520 | 0x11fe08 | 0x11ee08 | 0x398 |
ADVAPI32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CryptAcquireContextA | 0x0 | 0x4cd000 | 0x11f8e8 | 0x11e8e8 | 0xc1 |
CryptGenRandom | 0x0 | 0x4cd008 | 0x11f8f0 | 0x11e8f0 | 0xd2 |
CryptReleaseContext | 0x0 | 0x4cd010 | 0x11f8f8 | 0x11e8f8 | 0xdc |
GetUserNameA | 0x0 | 0x4cd018 | 0x11f900 | 0x11e900 | 0x17a |
IPHLPAPI.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetIpNetTable | 0x0 | 0x4cd028 | 0x11f910 | 0x11e910 | 0x69 |
WS2_32.dll (11)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
inet_ntoa | 0xc | 0x4cd540 | 0x11fe28 | 0x11ee28 | - |
connect | 0x4 | 0x4cd548 | 0x11fe30 | 0x11ee30 | - |
WSAGetLastError | 0x6f | 0x4cd550 | 0x11fe38 | 0x11ee38 | - |
socket | 0x17 | 0x4cd558 | 0x11fe40 | 0x11ee40 | - |
send | 0x13 | 0x4cd560 | 0x11fe48 | 0x11ee48 | - |
WSAStartup | 0x73 | 0x4cd568 | 0x11fe50 | 0x11ee50 | - |
gethostbyname | 0x34 | 0x4cd570 | 0x11fe58 | 0x11ee58 | - |
closesocket | 0x3 | 0x4cd578 | 0x11fe60 | 0x11ee60 | - |
WSACleanup | 0x74 | 0x4cd580 | 0x11fe68 | 0x11ee68 | - |
recv | 0x10 | 0x4cd588 | 0x11fe70 | 0x11ee70 | - |
htons | 0x9 | 0x4cd590 | 0x11fe78 | 0x11ee78 | - |
WININET.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
InternetCheckConnectionA | 0x0 | 0x4cd530 | 0x11fe18 | 0x11ee18 | 0x92 |
NETAPI32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
NetShareEnum | 0x0 | 0x4cd4e8 | 0x11fdd0 | 0x11edd0 | 0xde |
NetApiBufferFree | 0x0 | 0x4cd4f0 | 0x11fdd8 | 0x11edd8 | 0x51 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
26sdlxcbvjlumpme.exe | 1 | 0x01210000 | 0x0134BFFF | Relevant Image |
![]() |
64-bit | 0x012A1928 |
![]() |
![]() |
...
|
26sdlxcbvjlumpme.exe | 1 | 0x01210000 | 0x0134BFFF | Final Dump |
![]() |
64-bit | 0x012C0AB8 |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
DeepScan:Generic.Ransom.Fonix.2.57D59D3A |
Malicious
|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\How To Decrypt Files.hta | Dropped File | Text |
Unknown
|
...
|
»