VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Ransomware
Wiper
Dropper
...
|
Threat Names: |
Generic.Ransom.Paradise.8A352C3B
ByteCode-MSIL.Trojan.Cryptid
|
DP_Main.exe
Windows Exe (x86-32)
Created at 2020-01-18T19:37:00
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2018-01-18 03:07 (UTC+1) |
Last Seen | 2020-01-17 21:28 (UTC+1) |
Names | ByteCode-MSIL.Trojan.Cryptid |
Families | Cryptid |
Classification | Trojan |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4075be |
Size Of Code | 0x6000 |
Size Of Initialized Data | 0x2000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_cui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2018-01-13 13:10:31+00:00 |
Version Information (7)
»
Assembly Version | 0.0.0.0 |
FileDescription | |
FileVersion | 0.0.0.0 |
InternalName | DP_Main.exe |
LegalCopyright | |
OriginalFilename | DP_Main.exe |
ProductVersion | 0.0.0.0 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0x55c4 | 0x6000 | 0x1000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 4.71 |
.rsrc | 0x408000 | 0x4d8 | 0x1000 | 0x7000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 1.71 |
.reloc | 0x40a000 | 0xc | 0x1000 | 0x8000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.01 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0x7590 | 0x6590 | 0x0 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
dp_main.exe | 1 | 0x00BD0000 | 0x00BDBFFF | Relevant Image | 64-bit | - |
...
|
|||
dp_main.exe | 1 | 0x00BD0000 | 0x00BDBFFF | Final Dump | 64-bit | - |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Generic.Ransom.Paradise.8A352C3B |
Malicious
|
C:\Users\FD1HVy\AppData\Roaming\DP\RunAsAdmin.dp | Dropped File | Stream |
Whitelisted
|
...
|
»
File Reputation Information
»
Severity |
Whitelisted
|
First Seen | 2011-06-09 14:59 (UTC+2) |
Last Seen | 2019-10-27 02:48 (UTC+2) |
C:\Users\FD1HVy\Desktop\9kqgbPRnCB3J.wav | Modified File | Audio |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\aJjJomlXtRW.swf | Modified File | Unknown |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\AN6-Pxxi.odt[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Zip |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\AOHiWgJ_sDNW 3pSUMTE.gif | Modified File | Image |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\aWNU.m4a[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Audio |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\d8U.mp3[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\desktop.ini | Modified File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\FHxozOc_QKE.png | Modified File | Image |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\HAMwLsfXQw AUyW.bmp | Modified File | Image |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\hIB45OhCIGM_rvc7.wav[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Audio |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\J6aDIHYLiICtbUWWpQ-a.pps[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Unknown |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\j86dCykR.csv[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\JPGBwvW6.mp4 | Modified File | Video |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\jsitEZYllFX-rJ5-5Bo.jpg | Modified File | Image |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\LYjoidXOr1cO RartGH6.doc[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\mfI3M 25waSS25or.mkv | Modified File | Video |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\mUWrftnYC.wav | Modified File | Audio |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\NOXbRAUzS2JOG.mkv | Modified File | Video |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\OX8GrNcx.odt | Modified File | Zip |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\P1QsDkkSO.gif | Modified File | Image |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\PKWu5Wtief7lpBuOI5Rq.bmp[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\S0JM6N_kv2iT0Y.mp3[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\VfW_67RL 5rflPX.gif | Modified File | Image |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\3BhghfGOrqhAC_eQQ6Od.mp3[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\3ia1.avi | Modified File | Video |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\h_aPp4Z1 qH.pptx[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Zip |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\LRc4IZ.pps[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Unknown |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\Pfsago0l0hoTkQMLUo.wav[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Audio |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\RC P.bmp[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\s52eN1rLpoTGl.bmp | Modified File | Image |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\YkNd73RaLNAI.swf[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Unknown |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\euwZWkKHGolY\4YP7HqQHS\DDTioX.swf | Modified File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\euwZWkKHGolY\4YP7HqQHS\EEa-lpYoEt2.swf | Modified File | Unknown |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\euwZWkKHGolY\4YP7HqQHS\FmyEhH1MSJfnC7hBl.avi | Modified File | Video |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\euwZWkKHGolY\4YP7HqQHS\FpGsji mckJ_Ib.csv[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\euwZWkKHGolY\4YP7HqQHS\rtLz_6.flv[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Video |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\euwZWkKHGolY\4YP7HqQHS\VUIgmg-6k-bN DJNU.gif | Modified File | Image |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\euwZWkKHGolY\4YP7HqQHS\xRSxrtnv8iByIbSF.mp3[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\tint\5cMybALc71TfcLGH.bmp | Modified File | Image |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\tint\ktyDE7S1liK5.m4a | Modified File | Audio |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\tint\x t0SM5ueqs.xls | Modified File | Unknown |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\URfyazp6YCOme0Ken\tint\yxO7usXABrLDPO30.jpg | Modified File | Image |
Unknown
|
...
|
»
C:\$WINRE_BACKUP_PARTITION.MARKER | Modified File | Text |
Unknown
|
...
|
»
C:\BOOTNXT[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Text |
Unknown
|
...
|
»
C:\$GetCurrent\Logs\downlevel_2017_09_07_02_02_39_766.log[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Text |
Unknown
|
...
|
»
C:\$GetCurrent\Logs\oobe_2017_09_07_03_08_57_737.log | Modified File | Text |
Unknown
|
...
|
»
C:\$GetCurrent\Logs\PartnerSetupCompleteResult.log[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Text |
Unknown
|
...
|
»
C:\$GetCurrent\SafeOS\GetCurrentOOBE.dll | Modified File | Binary |
Unknown
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x1001912a |
Size Of Code | 0x1b200 |
Size Of Initialized Data | 0x4800 |
File Type | FileType.dll |
Subsystem | Subsystem.windows_cui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2017-07-14 16:53:24+00:00 |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x1b0e7 | 0x1b200 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.43 |
.data | 0x1001d000 | 0xd90 | 0x400 | 0x1b600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.96 |
.idata | 0x1001e000 | 0x10fe | 0x1200 | 0x1ba00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.99 |
.rsrc | 0x10020000 | 0x410 | 0x600 | 0x1cc00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.96 |
.reloc | 0x10021000 | 0x20f0 | 0x2200 | 0x1d200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.0 |
C:\$GetCurrent\SafeOS\GetCurrentRollback.ini[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Text |
Unknown
|
...
|
»
C:\$GetCurrent\SafeOS\PartnerSetupComplete.cmd[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Batch |
Unknown
|
...
|
»
C:\$GetCurrent\SafeOS\preoobe.cmd | Modified File | Batch |
Unknown
|
...
|
»
C:\$GetCurrent\SafeOS\SetupComplete.cmd[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Batch |
Unknown
|
...
|
»
C:\$Recycle.Bin\S-1-5-18\desktop.ini | Modified File | Text |
Unknown
|
...
|
»
C:\$Recycle.Bin\S-1-5-21-1051304884-625712362-2192934891-1000\desktop.ini[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Text |
Unknown
|
...
|
»
C:\588bce7c90097ed212\DHtmlHeader.html | Modified File | Text |
Unknown
|
...
|
»
C:\588bce7c90097ed212\DisplayIcon.ico | Modified File | Image |
Unknown
|
...
|
»
C:\588bce7c90097ed212\header.bmp[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Text |
Unknown
|
...
|
»
C:\588bce7c90097ed212\netfx_Core.mzz | Modified File | Unknown |
Unknown
|
...
|
»
C:\588bce7c90097ed212\netfx_Core_x64.msi | Modified File | Unknown |
Unknown
|
...
|
»
C:\588bce7c90097ed212\netfx_Core_x86.msi | Modified File | Unknown |
Unknown
|
...
|
»
C:\588bce7c90097ed212\netfx_Extended.mzz | Modified File | Unknown |
Unknown
|
...
|
»
C:\588bce7c90097ed212\netfx_Extended_x64.msi | Modified File | Unknown |
Unknown
|
...
|
»
C:\588bce7c90097ed212\netfx_Extended_x86.msi | Modified File | Unknown |
Unknown
|
...
|
»
C:\588bce7c90097ed212\ParameterInfo.xml | Modified File | Text |
Unknown
|
...
|
»
C:\588bce7c90097ed212\RGB9RAST_x64.msi[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Unknown |
Unknown
|
...
|
»
C:\588bce7c90097ed212\RGB9Rast_x86.msi | Modified File | Unknown |
Unknown
|
...
|
»
C:\588bce7c90097ed212\Setup.exe | Modified File | Binary |
Unknown
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x402b96 |
Size Of Code | 0x6600 |
Size Of Initialized Data | 0xbe00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2010-03-18 11:22:26+00:00 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x65e8 | 0x6600 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
.data | 0x408000 | 0x19e0 | 0xc00 | 0x6a00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.98 |
.rsrc | 0x40a000 | 0x9aa8 | 0x9c00 | 0x7600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.0 |
.reloc | 0x414000 | 0x7d8 | 0x800 | 0x11200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 5.98 |
C:\588bce7c90097ed212\SetupEngine.dll | Modified File | Binary |
Unknown
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x1007b059 |
Size Of Code | 0xaca00 |
Size Of Initialized Data | 0x18c00 |
File Type | FileType.dll |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2010-03-18 11:22:41+00:00 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0xac8a0 | 0xaca00 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.23 |
.data | 0x100ae000 | 0xb638 | 0x9800 | 0xace00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.19 |
.rsrc | 0x100ba000 | 0x8a8 | 0xa00 | 0xb6600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.98 |
.reloc | 0x100bb000 | 0xc900 | 0xca00 | 0xb7000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.0 |
Imports (17)
»
ADVAPI32.dll (48)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegOpenKeyExW | 0x0 | 0x10001000 | 0xaba14 | 0xaae14 | 0x261 |
RegCreateKeyExW | 0x0 | 0x10001004 | 0xaba18 | 0xaae18 | 0x239 |
RegSetValueExW | 0x0 | 0x10001008 | 0xaba1c | 0xaae1c | 0x27e |
RegCloseKey | 0x0 | 0x1000100c | 0xaba20 | 0xaae20 | 0x230 |
RegQueryValueExW | 0x0 | 0x10001010 | 0xaba24 | 0xaae24 | 0x26e |
AllocateAndInitializeSid | 0x0 | 0x10001014 | 0xaba28 | 0xaae28 | 0x20 |
CheckTokenMembership | 0x0 | 0x10001018 | 0xaba2c | 0xaae2c | 0x51 |
FreeSid | 0x0 | 0x1000101c | 0xaba30 | 0xaae30 | 0x120 |
OpenProcessToken | 0x0 | 0x10001020 | 0xaba34 | 0xaae34 | 0x1f7 |
LookupAccountSidW | 0x0 | 0x10001024 | 0xaba38 | 0xaae38 | 0x191 |
GetTokenInformation | 0x0 | 0x10001028 | 0xaba3c | 0xaae3c | 0x15a |
GetServiceDisplayNameW | 0x0 | 0x1000102c | 0xaba40 | 0xaae40 | 0x152 |
QueryServiceStatus | 0x0 | 0x10001030 | 0xaba44 | 0xaae44 | 0x228 |
OpenServiceW | 0x0 | 0x10001034 | 0xaba48 | 0xaae48 | 0x1fb |
CloseServiceHandle | 0x0 | 0x10001038 | 0xaba4c | 0xaae4c | 0x57 |
OpenSCManagerW | 0x0 | 0x1000103c | 0xaba50 | 0xaae50 | 0x1f9 |
ChangeServiceConfigW | 0x0 | 0x10001040 | 0xaba54 | 0xaae54 | 0x50 |
QueryServiceConfigW | 0x0 | 0x10001044 | 0xaba58 | 0xaae58 | 0x224 |
ControlService | 0x0 | 0x10001048 | 0xaba5c | 0xaae5c | 0x5c |
StartServiceW | 0x0 | 0x1000104c | 0xaba60 | 0xaae60 | 0x2c9 |
ControlTraceW | 0x0 | 0x10001050 | 0xaba64 | 0xaae64 | 0x60 |
StartTraceW | 0x0 | 0x10001054 | 0xaba68 | 0xaae68 | 0x2cb |
EnumerateTraceGuids | 0x0 | 0x10001058 | 0xaba6c | 0xaae6c | 0x103 |
EnableTrace | 0x0 | 0x1000105c | 0xaba70 | 0xaae70 | 0xf5 |
GetSidLengthRequired | 0x0 | 0x10001060 | 0xaba74 | 0xaae74 | 0x156 |
InitializeSid | 0x0 | 0x10001064 | 0xaba78 | 0xaae78 | 0x178 |
GetSidSubAuthority | 0x0 | 0x10001068 | 0xaba7c | 0xaae7c | 0x157 |
CopySid | 0x0 | 0x1000106c | 0xaba80 | 0xaae80 | 0x76 |
GetLengthSid | 0x0 | 0x10001070 | 0xaba84 | 0xaae84 | 0x136 |
IsValidSid | 0x0 | 0x10001074 | 0xaba88 | 0xaae88 | 0x186 |
InitializeAcl | 0x0 | 0x10001078 | 0xaba8c | 0xaae8c | 0x176 |
AddAce | 0x0 | 0x1000107c | 0xaba90 | 0xaae90 | 0x16 |
GetAclInformation | 0x0 | 0x10001080 | 0xaba94 | 0xaae94 | 0x124 |
GetSecurityDescriptorOwner | 0x0 | 0x10001084 | 0xaba98 | 0xaae98 | 0x14b |
GetSecurityDescriptorGroup | 0x0 | 0x10001088 | 0xaba9c | 0xaae9c | 0x149 |
GetSecurityDescriptorDacl | 0x0 | 0x1000108c | 0xabaa0 | 0xaaea0 | 0x148 |
SetSecurityDescriptorDacl | 0x0 | 0x10001090 | 0xabaa4 | 0xaaea4 | 0x2b6 |
GetSecurityDescriptorSacl | 0x0 | 0x10001094 | 0xabaa8 | 0xaaea8 | 0x14d |
MakeSelfRelativeSD | 0x0 | 0x10001098 | 0xabaac | 0xaaeac | 0x1e2 |
GetSecurityDescriptorLength | 0x0 | 0x1000109c | 0xabab0 | 0xaaeb0 | 0x14a |
GetSecurityDescriptorControl | 0x0 | 0x100010a0 | 0xabab4 | 0xaaeb4 | 0x147 |
MakeAbsoluteSD | 0x0 | 0x100010a4 | 0xabab8 | 0xaaeb8 | 0x1e0 |
InitializeSecurityDescriptor | 0x0 | 0x100010a8 | 0xababc | 0xaaebc | 0x177 |
LookupPrivilegeValueW | 0x0 | 0x100010ac | 0xabac0 | 0xaaec0 | 0x197 |
AdjustTokenPrivileges | 0x0 | 0x100010b0 | 0xabac4 | 0xaaec4 | 0x1f |
OpenThreadToken | 0x0 | 0x100010b4 | 0xabac8 | 0xaaec8 | 0x1fc |
InitiateSystemShutdownW | 0x0 | 0x100010b8 | 0xabacc | 0xaaecc | 0x17e |
InitiateSystemShutdownExW | 0x0 | 0x100010bc | 0xabad0 | 0xaaed0 | 0x17d |
KERNEL32.dll (150)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CloseHandle | 0x0 | 0x100010f4 | 0xabb08 | 0xaaf08 | 0x52 |
CreateFileW | 0x0 | 0x100010f8 | 0xabb0c | 0xaaf0c | 0x8f |
GetLastError | 0x0 | 0x100010fc | 0xabb10 | 0xaaf10 | 0x202 |
ReadFile | 0x0 | 0x10001100 | 0xabb14 | 0xaaf14 | 0x3c0 |
WriteFile | 0x0 | 0x10001104 | 0xabb18 | 0xaaf18 | 0x525 |
GetOverlappedResult | 0x0 | 0x10001108 | 0xabb1c | 0xaaf1c | 0x238 |
SetFilePointer | 0x0 | 0x1000110c | 0xabb20 | 0xaaf20 | 0x466 |
FlushFileBuffers | 0x0 | 0x10001110 | 0xabb24 | 0xaaf24 | 0x157 |
SetEndOfFile | 0x0 | 0x10001114 | 0xabb28 | 0xaaf28 | 0x453 |
GetFileSize | 0x0 | 0x10001118 | 0xabb2c | 0xaaf2c | 0x1f0 |
GetTempPathW | 0x0 | 0x1000111c | 0xabb30 | 0xaaf30 | 0x285 |
GetTempFileNameW | 0x0 | 0x10001120 | 0xabb34 | 0xaaf34 | 0x283 |
DeleteFileW | 0x0 | 0x10001124 | 0xabb38 | 0xaaf38 | 0xd6 |
MoveFileW | 0x0 | 0x10001128 | 0xabb3c | 0xaaf3c | 0x363 |
CreateFileMappingW | 0x0 | 0x1000112c | 0xabb40 | 0xaaf40 | 0x8c |
OpenFileMappingW | 0x0 | 0x10001130 | 0xabb44 | 0xaaf44 | 0x379 |
UnmapViewOfFile | 0x0 | 0x10001134 | 0xabb48 | 0xaaf48 | 0x4d6 |
DuplicateHandle | 0x0 | 0x10001138 | 0xabb4c | 0xaaf4c | 0xe8 |
GetCurrentProcess | 0x0 | 0x1000113c | 0xabb50 | 0xaaf50 | 0x1c0 |
GetThreadLocale | 0x0 | 0x10001140 | 0xabb54 | 0xaaf54 | 0x28c |
MultiByteToWideChar | 0x0 | 0x10001144 | 0xabb58 | 0xaaf58 | 0x367 |
WideCharToMultiByte | 0x0 | 0x10001148 | 0xabb5c | 0xaaf5c | 0x511 |
FindFirstFileW | 0x0 | 0x1000114c | 0xabb60 | 0xaaf60 | 0x139 |
GetFullPathNameW | 0x0 | 0x10001150 | 0xabb64 | 0xaaf64 | 0x1fb |
SetLastError | 0x0 | 0x10001154 | 0xabb68 | 0xaaf68 | 0x473 |
FindNextFileW | 0x0 | 0x10001158 | 0xabb6c | 0xaaf6c | 0x145 |
FindClose | 0x0 | 0x1000115c | 0xabb70 | 0xaaf70 | 0x12e |
GetUserDefaultUILanguage | 0x0 | 0x10001160 | 0xabb74 | 0xaaf74 | 0x29e |
GetSystemDirectoryW | 0x0 | 0x10001164 | 0xabb78 | 0xaaf78 | 0x270 |
FreeLibrary | 0x0 | 0x10001168 | 0xabb7c | 0xaaf7c | 0x162 |
LoadLibraryW | 0x0 | 0x1000116c | 0xabb80 | 0xaaf80 | 0x33f |
Process32NextW | 0x0 | 0x10001170 | 0xabb84 | 0xaaf84 | 0x398 |
Process32FirstW | 0x0 | 0x10001174 | 0xabb88 | 0xaaf88 | 0x396 |
CreateToolhelp32Snapshot | 0x0 | 0x10001178 | 0xabb8c | 0xaaf8c | 0xbe |
OpenProcess | 0x0 | 0x1000117c | 0xabb90 | 0xaaf90 | 0x380 |
GetCurrentProcessId | 0x0 | 0x10001180 | 0xabb94 | 0xaaf94 | 0x1c1 |
GetDiskFreeSpaceExW | 0x0 | 0x10001184 | 0xabb98 | 0xaaf98 | 0x1ce |
GetTickCount | 0x0 | 0x10001188 | 0xabb9c | 0xaaf9c | 0x293 |
CreateEventW | 0x0 | 0x1000118c | 0xabba0 | 0xaafa0 | 0x85 |
WaitForSingleObject | 0x0 | 0x10001190 | 0xabba4 | 0xaafa4 | 0x4f9 |
ResetEvent | 0x0 | 0x10001194 | 0xabba8 | 0xaafa8 | 0x40f |
WaitForMultipleObjects | 0x0 | 0x10001198 | 0xabbac | 0xaafac | 0x4f7 |
SetEvent | 0x0 | 0x1000119c | 0xabbb0 | 0xaafb0 | 0x459 |
CreateThread | 0x0 | 0x100011a0 | 0xabbb4 | 0xaafb4 | 0xb5 |
MapViewOfFile | 0x0 | 0x100011a4 | 0xabbb8 | 0xaafb8 | 0x357 |
OpenEventW | 0x0 | 0x100011a8 | 0xabbbc | 0xaafbc | 0x375 |
GetFileSizeEx | 0x0 | 0x100011ac | 0xabbc0 | 0xaafc0 | 0x1f1 |
GetFileAttributesW | 0x0 | 0x100011b0 | 0xabbc4 | 0xaafc4 | 0x1ea |
GetSystemTime | 0x0 | 0x100011b4 | 0xabbc8 | 0xaafc8 | 0x277 |
SystemTimeToFileTime | 0x0 | 0x100011b8 | 0xabbcc | 0xaafcc | 0x4bd |
GetExitCodeProcess | 0x0 | 0x100011bc | 0xabbd0 | 0xaafd0 | 0x1df |
CompareFileTime | 0x0 | 0x100011c0 | 0xabbd4 | 0xaafd4 | 0x60 |
CreateProcessW | 0x0 | 0x100011c4 | 0xabbd8 | 0xaafd8 | 0xa8 |
Sleep | 0x0 | 0x100011c8 | 0xabbdc | 0xaafdc | 0x4b2 |
CancelIo | 0x0 | 0x100011cc | 0xabbe0 | 0xaafe0 | 0x42 |
DisconnectNamedPipe | 0x0 | 0x100011d0 | 0xabbe4 | 0xaafe4 | 0xe1 |
CreateNamedPipeW | 0x0 | 0x100011d4 | 0xabbe8 | 0xaafe8 | 0xa0 |
ConnectNamedPipe | 0x0 | 0x100011d8 | 0xabbec | 0xaafec | 0x65 |
WaitNamedPipeW | 0x0 | 0x100011dc | 0xabbf0 | 0xaaff0 | 0x500 |
LocalAlloc | 0x0 | 0x100011e0 | 0xabbf4 | 0xaaff4 | 0x344 |
CopyFileW | 0x0 | 0x100011e4 | 0xabbf8 | 0xaaff8 | 0x75 |
SetFileAttributesW | 0x0 | 0x100011e8 | 0xabbfc | 0xaaffc | 0x461 |
GetCurrentThreadId | 0x0 | 0x100011ec | 0xabc00 | 0xab000 | 0x1c5 |
GetCurrentThread | 0x0 | 0x100011f0 | 0xabc04 | 0xab004 | 0x1c4 |
InitializeCriticalSection | 0x0 | 0x100011f4 | 0xabc08 | 0xab008 | 0x2e2 |
DeleteCriticalSection | 0x0 | 0x100011f8 | 0xabc0c | 0xab00c | 0xd1 |
EnterCriticalSection | 0x0 | 0x100011fc | 0xabc10 | 0xab010 | 0xee |
LeaveCriticalSection | 0x0 | 0x10001200 | 0xabc14 | 0xab014 | 0x339 |
OpenMutexW | 0x0 | 0x10001204 | 0xabc18 | 0xab018 | 0x37d |
CreateMutexW | 0x0 | 0x10001208 | 0xabc1c | 0xab01c | 0x9e |
GetLocalTime | 0x0 | 0x1000120c | 0xabc20 | 0xab020 | 0x203 |
GetTimeZoneInformation | 0x0 | 0x10001210 | 0xabc24 | 0xab024 | 0x298 |
SizeofResource | 0x0 | 0x10001214 | 0xabc28 | 0xab028 | 0x4b1 |
LockResource | 0x0 | 0x10001218 | 0xabc2c | 0xab02c | 0x354 |
LoadResource | 0x0 | 0x1000121c | 0xabc30 | 0xab030 | 0x341 |
FindResourceW | 0x0 | 0x10001220 | 0xabc34 | 0xab034 | 0x14e |
RaiseException | 0x0 | 0x10001224 | 0xabc38 | 0xab038 | 0x3b1 |
GlobalMemoryStatus | 0x0 | 0x10001228 | 0xabc3c | 0xab03c | 0x2bf |
GetSystemDefaultLangID | 0x0 | 0x1000122c | 0xabc40 | 0xab040 | 0x26c |
GetEnvironmentVariableW | 0x0 | 0x10001230 | 0xabc44 | 0xab044 | 0x1dc |
DebugBreak | 0x0 | 0x10001234 | 0xabc48 | 0xab048 | 0xc7 |
FindResourceExW | 0x0 | 0x10001238 | 0xabc4c | 0xab04c | 0x14d |
GlobalMemoryStatusEx | 0x0 | 0x1000123c | 0xabc50 | 0xab050 | 0x2c0 |
SetUnhandledExceptionFilter | 0x0 | 0x10001240 | 0xabc54 | 0xab054 | 0x4a5 |
ExitProcess | 0x0 | 0x10001244 | 0xabc58 | 0xab058 | 0x119 |
lstrcmpA | 0x0 | 0x10001248 | 0xabc5c | 0xab05c | 0x541 |
ReleaseMutex | 0x0 | 0x1000124c | 0xabc60 | 0xab060 | 0x3fa |
lstrlenW | 0x0 | 0x10001250 | 0xabc64 | 0xab064 | 0x54e |
CreateDirectoryW | 0x0 | 0x10001254 | 0xabc68 | 0xab068 | 0x81 |
MoveFileExW | 0x0 | 0x10001258 | 0xabc6c | 0xab06c | 0x360 |
InterlockedIncrement | 0x0 | 0x1000125c | 0xabc70 | 0xab070 | 0x2ef |
InterlockedDecrement | 0x0 | 0x10001260 | 0xabc74 | 0xab074 | 0x2eb |
GlobalFree | 0x0 | 0x10001264 | 0xabc78 | 0xab078 | 0x2ba |
GetCurrentDirectoryW | 0x0 | 0x10001268 | 0xabc7c | 0xab07c | 0x1bf |
InterlockedCompareExchange | 0x0 | 0x1000126c | 0xabc80 | 0xab080 | 0x2e9 |
GetModuleFileNameW | 0x0 | 0x10001270 | 0xabc84 | 0xab084 | 0x214 |
FileTimeToLocalFileTime | 0x0 | 0x10001274 | 0xabc88 | 0xab088 | 0x124 |
WriteConsoleW | 0x0 | 0x10001278 | 0xabc8c | 0xab08c | 0x524 |
SetStdHandle | 0x0 | 0x1000127c | 0xabc90 | 0xab090 | 0x487 |
GetConsoleMode | 0x0 | 0x10001280 | 0xabc94 | 0xab094 | 0x1ac |
GetConsoleCP | 0x0 | 0x10001284 | 0xabc98 | 0xab098 | 0x19a |
IsProcessorFeaturePresent | 0x0 | 0x10001288 | 0xabc9c | 0xab09c | 0x304 |
RtlUnwind | 0x0 | 0x1000128c | 0xabca0 | 0xab0a0 | 0x418 |
LCMapStringW | 0x0 | 0x10001290 | 0xabca4 | 0xab0a4 | 0x32d |
IsValidCodePage | 0x0 | 0x10001294 | 0xabca8 | 0xab0a8 | 0x30a |
GetOEMCP | 0x0 | 0x10001298 | 0xabcac | 0xab0ac | 0x237 |
GetACP | 0x0 | 0x1000129c | 0xabcb0 | 0xab0b0 | 0x168 |
GetCPInfo | 0x0 | 0x100012a0 | 0xabcb4 | 0xab0b4 | 0x172 |
HeapReAlloc | 0x0 | 0x100012a4 | 0xabcb8 | 0xab0b8 | 0x2d2 |
GetStringTypeW | 0x0 | 0x100012a8 | 0xabcbc | 0xab0bc | 0x269 |
HeapSize | 0x0 | 0x100012ac | 0xabcc0 | 0xab0c0 | 0x2d4 |
IsDebuggerPresent | 0x0 | 0x100012b0 | 0xabcc4 | 0xab0c4 | 0x300 |
UnhandledExceptionFilter | 0x0 | 0x100012b4 | 0xabcc8 | 0xab0c8 | 0x4d3 |
TerminateProcess | 0x0 | 0x100012b8 | 0xabccc | 0xab0cc | 0x4c0 |
QueryPerformanceCounter | 0x0 | 0x100012bc | 0xabcd0 | 0xab0d0 | 0x3a7 |
GetProcessHeap | 0x0 | 0x100012c0 | 0xabcd4 | 0xab0d4 | 0x24a |
HeapDestroy | 0x0 | 0x100012c4 | 0xabcd8 | 0xab0d8 | 0x2ce |
HeapCreate | 0x0 | 0x100012c8 | 0xabcdc | 0xab0dc | 0x2cd |
GetEnvironmentStringsW | 0x0 | 0x100012cc | 0xabce0 | 0xab0e0 | 0x1da |
FreeEnvironmentStringsW | 0x0 | 0x100012d0 | 0xabce4 | 0xab0e4 | 0x161 |
GetModuleFileNameA | 0x0 | 0x100012d4 | 0xabce8 | 0xab0e8 | 0x213 |
GetStartupInfoW | 0x0 | 0x100012d8 | 0xabcec | 0xab0ec | 0x263 |
GetFileType | 0x0 | 0x100012dc | 0xabcf0 | 0xab0f0 | 0x1f3 |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x100012e0 | 0xabcf4 | 0xab0f4 | 0x2e3 |
GetStdHandle | 0x0 | 0x100012e4 | 0xabcf8 | 0xab0f8 | 0x264 |
SetHandleCount | 0x0 | 0x100012e8 | 0xabcfc | 0xab0fc | 0x46f |
TlsFree | 0x0 | 0x100012ec | 0xabd00 | 0xab100 | 0x4c6 |
TlsSetValue | 0x0 | 0x100012f0 | 0xabd04 | 0xab104 | 0x4c8 |
TlsGetValue | 0x0 | 0x100012f4 | 0xabd08 | 0xab108 | 0x4c7 |
TlsAlloc | 0x0 | 0x100012f8 | 0xabd0c | 0xab10c | 0x4c5 |
VirtualQuery | 0x0 | 0x100012fc | 0xabd10 | 0xab110 | 0x4f1 |
VirtualAlloc | 0x0 | 0x10001300 | 0xabd14 | 0xab114 | 0x4e9 |
VirtualProtect | 0x0 | 0x10001304 | 0xabd18 | 0xab118 | 0x4ef |
InterlockedExchange | 0x0 | 0x10001308 | 0xabd1c | 0xab11c | 0x2ec |
HeapAlloc | 0x0 | 0x1000130c | 0xabd20 | 0xab120 | 0x2cb |
HeapFree | 0x0 | 0x10001310 | 0xabd24 | 0xab124 | 0x2cf |
GetSystemTimeAsFileTime | 0x0 | 0x10001314 | 0xabd28 | 0xab128 | 0x279 |
GetCommandLineA | 0x0 | 0x10001318 | 0xabd2c | 0xab12c | 0x186 |
GetCommandLineW | 0x0 | 0x1000131c | 0xabd30 | 0xab130 | 0x187 |
VerifyVersionInfoW | 0x0 | 0x10001320 | 0xabd34 | 0xab134 | 0x4e8 |
VerSetConditionMask | 0x0 | 0x10001324 | 0xabd38 | 0xab138 | 0x4e4 |
GetSystemInfo | 0x0 | 0x10001328 | 0xabd3c | 0xab13c | 0x273 |
ExpandEnvironmentStringsW | 0x0 | 0x1000132c | 0xabd40 | 0xab140 | 0x11d |
LocalFree | 0x0 | 0x10001330 | 0xabd44 | 0xab144 | 0x348 |
FormatMessageW | 0x0 | 0x10001334 | 0xabd48 | 0xab148 | 0x15e |
OutputDebugStringW | 0x0 | 0x10001338 | 0xabd4c | 0xab14c | 0x38a |
GetModuleHandleW | 0x0 | 0x1000133c | 0xabd50 | 0xab150 | 0x218 |
GetProcAddress | 0x0 | 0x10001340 | 0xabd54 | 0xab154 | 0x245 |
GetVersionExW | 0x0 | 0x10001344 | 0xabd58 | 0xab158 | 0x2a4 |
GetFileAttributesExW | 0x0 | 0x10001348 | 0xabd5c | 0xab15c | 0x1e7 |
USER32.dll (30)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
PostThreadMessageW | 0x0 | 0x100013e0 | 0xabdf4 | 0xab1f4 | 0x239 |
SendMessageW | 0x0 | 0x100013e4 | 0xabdf8 | 0xab1f8 | 0x27c |
ExitWindowsEx | 0x0 | 0x100013e8 | 0xabdfc | 0xab1fc | 0xf5 |
MessageBoxW | 0x0 | 0x100013ec | 0xabe00 | 0xab200 | 0x215 |
PostMessageW | 0x0 | 0x100013f0 | 0xabe04 | 0xab204 | 0x236 |
GetDesktopWindow | 0x0 | 0x100013f4 | 0xabe08 | 0xab208 | 0x123 |
LoadImageW | 0x0 | 0x100013f8 | 0xabe0c | 0xab20c | 0x1ef |
SetWindowLongW | 0x0 | 0x100013fc | 0xabe10 | 0xab210 | 0x2c4 |
GetWindow | 0x0 | 0x10001400 | 0xabe14 | 0xab214 | 0x18e |
GetWindowLongW | 0x0 | 0x10001404 | 0xabe18 | 0xab218 | 0x196 |
MonitorFromWindow | 0x0 | 0x10001408 | 0xabe1c | 0xab21c | 0x21a |
GetMonitorInfoW | 0x0 | 0x1000140c | 0xabe20 | 0xab220 | 0x15f |
GetWindowRect | 0x0 | 0x10001410 | 0xabe24 | 0xab224 | 0x19c |
PeekMessageW | 0x0 | 0x10001414 | 0xabe28 | 0xab228 | 0x233 |
GetClientRect | 0x0 | 0x10001418 | 0xabe2c | 0xab22c | 0x114 |
MapWindowPoints | 0x0 | 0x1000141c | 0xabe30 | 0xab230 | 0x209 |
SetWindowPos | 0x0 | 0x10001420 | 0xabe34 | 0xab234 | 0x2c6 |
DispatchMessageW | 0x0 | 0x10001424 | 0xabe38 | 0xab238 | 0xaf |
TranslateMessage | 0x0 | 0x10001428 | 0xabe3c | 0xab23c | 0x2fc |
GetMessageW | 0x0 | 0x1000142c | 0xabe40 | 0xab240 | 0x15d |
UpdateWindow | 0x0 | 0x10001430 | 0xabe44 | 0xab244 | 0x311 |
ShowWindow | 0x0 | 0x10001434 | 0xabe48 | 0xab248 | 0x2df |
IsWindowVisible | 0x0 | 0x10001438 | 0xabe4c | 0xab24c | 0x1e0 |
GetWindowTextW | 0x0 | 0x1000143c | 0xabe50 | 0xab250 | 0x1a3 |
GetWindowThreadProcessId | 0x0 | 0x10001440 | 0xabe54 | 0xab254 | 0x1a4 |
EnumWindows | 0x0 | 0x10001444 | 0xabe58 | 0xab258 | 0xf2 |
GetSystemMetrics | 0x0 | 0x10001448 | 0xabe5c | 0xab25c | 0x17e |
MsgWaitForMultipleObjects | 0x0 | 0x1000144c | 0xabe60 | 0xab260 | 0x21c |
GetParent | 0x0 | 0x10001450 | 0xabe64 | 0xab264 | 0x164 |
CreateWindowExW | 0x0 | 0x10001454 | 0xabe68 | 0xab268 | 0x6e |
SHELL32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SHFileOperationW | 0x0 | 0x10001380 | 0xabd94 | 0xab194 | 0xac |
(by ordinal) | 0xa5 | 0x10001384 | 0xabd98 | 0xab198 | - |
SHGetFolderPathW | 0x0 | 0x10001388 | 0xabd9c | 0xab19c | 0xc3 |
SHCreateDirectoryExW | 0x0 | 0x1000138c | 0xabda0 | 0xab1a0 | 0x8d |
ole32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CoUninitialize | 0x0 | 0x10001548 | 0xabf5c | 0xab35c | 0x6c |
CoCreateInstance | 0x0 | 0x1000154c | 0xabf60 | 0xab360 | 0x10 |
CoTaskMemFree | 0x0 | 0x10001550 | 0xabf64 | 0xab364 | 0x68 |
CoInitialize | 0x0 | 0x10001554 | 0xabf68 | 0xab368 | 0x3e |
OLEAUT32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysAllocStringLen | 0x4 | 0x10001350 | 0xabd64 | 0xab164 | - |
SysFreeString | 0x6 | 0x10001354 | 0xabd68 | 0xab168 | - |
SysStringLen | 0x7 | 0x10001358 | 0xabd6c | 0xab16c | - |
SysStringByteLen | 0x95 | 0x1000135c | 0xabd70 | 0xab170 | - |
SysAllocStringByteLen | 0x96 | 0x10001360 | 0xabd74 | 0xab174 | - |
SysAllocString | 0x2 | 0x10001364 | 0xabd78 | 0xab178 | - |
VariantClear | 0x9 | 0x10001368 | 0xabd7c | 0xab17c | - |
VariantInit | 0x8 | 0x1000136c | 0xabd80 | 0xab180 | - |
SHLWAPI.dll (16)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
PathCompactPathExW | 0x0 | 0x10001394 | 0xabda8 | 0xab1a8 | 0x3f |
PathStripToRootW | 0x0 | 0x10001398 | 0xabdac | 0xab1ac | 0x97 |
PathRemoveExtensionW | 0x0 | 0x1000139c | 0xabdb0 | 0xab1b0 | 0x89 |
PathFileExistsW | 0x0 | 0x100013a0 | 0xabdb4 | 0xab1b4 | 0x45 |
StrPBrkW | 0x0 | 0x100013a4 | 0xabdb8 | 0xab1b8 | 0x135 |
PathAppendW | 0x0 | 0x100013a8 | 0xabdbc | 0xab1bc | 0x34 |
PathCombineW | 0x0 | 0x100013ac | 0xabdc0 | 0xab1c0 | 0x3a |
PathFindExtensionW | 0x0 | 0x100013b0 | 0xabdc4 | 0xab1c4 | 0x47 |
PathFindFileNameW | 0x0 | 0x100013b4 | 0xabdc8 | 0xab1c8 | 0x49 |
PathIsDirectoryW | 0x0 | 0x100013b8 | 0xabdcc | 0xab1cc | 0x5b |
PathIsRelativeW | 0x0 | 0x100013bc | 0xabdd0 | 0xab1d0 | 0x65 |
PathQuoteSpacesW | 0x0 | 0x100013c0 | 0xabdd4 | 0xab1d4 | 0x7f |
PathRelativePathToW | 0x0 | 0x100013c4 | 0xabdd8 | 0xab1d8 | 0x81 |
PathGetDriveNumberW | 0x0 | 0x100013c8 | 0xabddc | 0xab1dc | 0x55 |
PathStripPathW | 0x0 | 0x100013cc | 0xabde0 | 0xab1e0 | 0x95 |
PathRemoveFileSpecW | 0x0 | 0x100013d0 | 0xabde4 | 0xab1e4 | 0x8b |
VERSION.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
VerQueryValueW | 0x0 | 0x10001468 | 0xabe7c | 0xab27c | 0xe |
GetFileVersionInfoW | 0x0 | 0x1000146c | 0xabe80 | 0xab280 | 0x6 |
GetFileVersionInfoSizeW | 0x0 | 0x10001470 | 0xabe84 | 0xab284 | 0x5 |
msi.dll (33)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
(by ordinal) | 0xb3 | 0x100014c0 | 0xabed4 | 0xab2d4 | - |
(by ordinal) | 0x74 | 0x100014c4 | 0xabed8 | 0xab2d8 | - |
(by ordinal) | 0xc3 | 0x100014c8 | 0xabedc | 0xab2dc | - |
(by ordinal) | 0xd7 | 0x100014cc | 0xabee0 | 0xab2e0 | - |
(by ordinal) | 0xfe | 0x100014d0 | 0xabee4 | 0xab2e4 | - |
(by ordinal) | 0x8d | 0x100014d4 | 0xabee8 | 0xab2e8 | - |
(by ordinal) | 0x119 | 0x100014d8 | 0xabeec | 0xab2ec | - |
(by ordinal) | 0xab | 0x100014dc | 0xabef0 | 0xab2f0 | - |
(by ordinal) | 0xf6 | 0x100014e0 | 0xabef4 | 0xab2f4 | - |
(by ordinal) | 0xf4 | 0x100014e4 | 0xabef8 | 0xab2f8 | - |
(by ordinal) | 0x5a | 0x100014e8 | 0xabefc | 0xab2fc | - |
(by ordinal) | 0x96 | 0x100014ec | 0xabf00 | 0xab300 | - |
(by ordinal) | 0x6f | 0x100014f0 | 0xabf04 | 0xab304 | - |
(by ordinal) | 0x46 | 0x100014f4 | 0xabf08 | 0xab308 | - |
(by ordinal) | 0x76 | 0x100014f8 | 0xabf0c | 0xab30c | - |
(by ordinal) | 0xa0 | 0x100014fc | 0xabf10 | 0xab310 | - |
(by ordinal) | 0x9f | 0x10001500 | 0xabf14 | 0xab314 | - |
(by ordinal) | 0x20 | 0x10001504 | 0xabf18 | 0xab318 | - |
(by ordinal) | 0x5c | 0x10001508 | 0xabf1c | 0xab31c | - |
(by ordinal) | 0x4e | 0x1000150c | 0xabf20 | 0xab320 | - |
(by ordinal) | 0xee | 0x10001510 | 0xabf24 | 0xab324 | - |
(by ordinal) | 0xbe | 0x10001514 | 0xabf28 | 0xab328 | - |
(by ordinal) | 0x71 | 0x10001518 | 0xabf2c | 0xab32c | - |
(by ordinal) | 0x7d | 0x1000151c | 0xabf30 | 0xab330 | - |
(by ordinal) | 0x8 | 0x10001520 | 0xabf34 | 0xab334 | - |
(by ordinal) | 0x73 | 0x10001524 | 0xabf38 | 0xab338 | - |
(by ordinal) | 0x89 | 0x10001528 | 0xabf3c | 0xab33c | - |
(by ordinal) | 0xa9 | 0x1000152c | 0xabf40 | 0xab340 | - |
(by ordinal) | 0x2b | 0x10001530 | 0xabf44 | 0xab344 | - |
(by ordinal) | 0x11 | 0x10001534 | 0xabf48 | 0xab348 | - |
(by ordinal) | 0x10e | 0x10001538 | 0xabf4c | 0xab34c | - |
(by ordinal) | 0x58 | 0x1000153c | 0xabf50 | 0xab350 | - |
(by ordinal) | 0xcd | 0x10001540 | 0xabf54 | 0xab354 | - |
USERENV.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
UnloadUserProfile | 0x0 | 0x1000145c | 0xabe70 | 0xab270 | 0x2c |
ExpandEnvironmentStringsForUserW | 0x0 | 0x10001460 | 0xabe74 | 0xab274 | 0xc |
PSAPI.DLL (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
EnumProcessModules | 0x0 | 0x10001374 | 0xabd88 | 0xab188 | 0x4 |
GetModuleBaseNameW | 0x0 | 0x10001378 | 0xabd8c | 0xab18c | 0xe |
WINHTTP.dll (15)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WinHttpGetIEProxyConfigForCurrentUser | 0x0 | 0x10001478 | 0xabe8c | 0xab28c | 0xd |
WinHttpSendRequest | 0x0 | 0x1000147c | 0xabe90 | 0xab290 | 0x17 |
WinHttpOpenRequest | 0x0 | 0x10001480 | 0xabe94 | 0xab294 | 0x10 |
WinHttpConnect | 0x0 | 0x10001484 | 0xabe98 | 0xab298 | 0x8 |
WinHttpOpen | 0x0 | 0x10001488 | 0xabe9c | 0xab29c | 0xf |
WinHttpQueryHeaders | 0x0 | 0x1000148c | 0xabea0 | 0xab2a0 | 0x13 |
WinHttpDetectAutoProxyConfigUrl | 0x0 | 0x10001490 | 0xabea4 | 0xab2a4 | 0xb |
WinHttpGetProxyForUrl | 0x0 | 0x10001494 | 0xabea8 | 0xab2a8 | 0xe |
WinHttpCloseHandle | 0x0 | 0x10001498 | 0xabeac | 0xab2ac | 0x7 |
WinHttpQueryDataAvailable | 0x0 | 0x1000149c | 0xabeb0 | 0xab2b0 | 0x12 |
WinHttpReadData | 0x0 | 0x100014a0 | 0xabeb4 | 0xab2b4 | 0x15 |
WinHttpReceiveResponse | 0x0 | 0x100014a4 | 0xabeb8 | 0xab2b8 | 0x16 |
WinHttpSetStatusCallback | 0x0 | 0x100014a8 | 0xabebc | 0xab2bc | 0x1b |
WinHttpQueryAuthSchemes | 0x0 | 0x100014ac | 0xabec0 | 0xab2c0 | 0x11 |
WinHttpSetCredentials | 0x0 | 0x100014b0 | 0xabec4 | 0xab2c4 | 0x18 |
Secur32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetComputerObjectNameW | 0x0 | 0x100013d8 | 0xabdec | 0xab1ec | 0x1b |
WINTRUST.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WinVerifyTrust | 0x0 | 0x100014b8 | 0xabecc | 0xab2cc | 0x73 |
CRYPT32.dll (11)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CertVerifyCertificateChainPolicy | 0x0 | 0x100010c4 | 0xabad8 | 0xaaed8 | 0x74 |
CryptQueryObject | 0x0 | 0x100010c8 | 0xabadc | 0xaaedc | 0xbf |
CryptMsgGetAndVerifySigner | 0x0 | 0x100010cc | 0xabae0 | 0xaaee0 | 0xb5 |
CryptHashPublicKeyInfo | 0x0 | 0x100010d0 | 0xabae4 | 0xaaee4 | 0xa1 |
CryptMsgGetParam | 0x0 | 0x100010d4 | 0xabae8 | 0xaaee8 | 0xb6 |
CryptDecodeObject | 0x0 | 0x100010d8 | 0xabaec | 0xaaeec | 0x82 |
CryptMsgClose | 0x0 | 0x100010dc | 0xabaf0 | 0xaaef0 | 0xaf |
CertCloseStore | 0x0 | 0x100010e0 | 0xabaf4 | 0xaaef4 | 0x12 |
CertFreeCertificateContext | 0x0 | 0x100010e4 | 0xabaf8 | 0xaaef8 | 0x40 |
CertFreeCertificateChain | 0x0 | 0x100010e8 | 0xabafc | 0xaaefc | 0x3d |
CertGetCertificateChain | 0x0 | 0x100010ec | 0xabb00 | 0xaaf00 | 0x45 |
sqmapi.dll (19)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SqmGetSession | 0x0 | 0x1000155c | 0xabf70 | 0xab370 | 0xd |
SqmEndSession | 0x0 | 0x10001560 | 0xabf74 | 0xab374 | 0x8 |
SqmIsWindowsOptedIn | 0x0 | 0x10001564 | 0xabf78 | 0xab378 | 0x11 |
SqmSetMachineId | 0x0 | 0x10001568 | 0xabf7c | 0xab37c | 0x1e |
SqmWriteSharedMachineId | 0x0 | 0x1000156c | 0xabf80 | 0xab380 | 0x2b |
SqmReadSharedMachineId | 0x0 | 0x10001570 | 0xabf84 | 0xab384 | 0x12 |
SqmSetUserId | 0x0 | 0x10001574 | 0xabf88 | 0xab388 | 0x20 |
SqmWriteSharedUserId | 0x0 | 0x10001578 | 0xabf8c | 0xab38c | 0x2c |
SqmCreateNewId | 0x0 | 0x1000157c | 0xabf90 | 0xab390 | 0x7 |
SqmReadSharedUserId | 0x0 | 0x10001580 | 0xabf94 | 0xab394 | 0x13 |
SqmAddToStreamString | 0x0 | 0x10001584 | 0xabf98 | 0xab398 | 0x3 |
SqmAddToStreamDWord | 0x0 | 0x10001588 | 0xabf9c | 0xab39c | 0x2 |
SqmTimerRecord | 0x0 | 0x1000158c | 0xabfa0 | 0xab3a0 | 0x27 |
SqmTimerStart | 0x0 | 0x10001590 | 0xabfa4 | 0xab3a4 | 0x28 |
SqmSetBool | 0x0 | 0x10001594 | 0xabfa8 | 0xab3a8 | 0x18 |
SqmSet | 0x0 | 0x10001598 | 0xabfac | 0xab3ac | 0x14 |
SqmWaitForUploadComplete | 0x0 | 0x1000159c | 0xabfb0 | 0xab3b0 | 0x2a |
SqmStartUpload | 0x0 | 0x100015a0 | 0xabfb4 | 0xab3b4 | 0x22 |
SqmSetString | 0x0 | 0x100015a4 | 0xabfb8 | 0xab3b8 | 0x1f |
urlmon.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
URLDownloadToFileW | 0x0 | 0x100015ac | 0xabfc0 | 0xab3c0 | 0x68 |
Exports (4)
»
Api name | EAT Address | Ordinal |
---|---|---|
MakePImpl | 0x7ab60 | 0x3 |
Run | 0x5830c | 0x4 |
_DecodePointerInternal@4 | 0x7adc9 | 0x1 |
_EncodePointerInternal@4 | 0x7ada7 | 0x2 |
C:\588bce7c90097ed212\SetupUi.dll | Modified File | Binary |
Unknown
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10028789 |
Size Of Code | 0x3d800 |
Size Of Initialized Data | 0xac00 |
File Type | FileType.dll |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2010-03-18 11:22:35+00:00 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x3d792 | 0x3d800 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.44 |
.data | 0x1003f000 | 0x519c | 0x3400 | 0x3dc00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 6.0 |
.rsrc | 0x10045000 | 0x3b0 | 0x400 | 0x41000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.96 |
.reloc | 0x10046000 | 0x54bc | 0x5600 | 0x41400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.0 |
C:\588bce7c90097ed212\SetupUi.xsd | Modified File | Text |
Unknown
|
...
|
»
C:\588bce7c90097ed212\SetupUtility.exe | Modified File | Binary |
Unknown
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x405eb6 |
Size Of Code | 0x13000 |
Size Of Initialized Data | 0x4c00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2010-03-18 11:22:28+00:00 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x12edf | 0x13000 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.59 |
.data | 0x414000 | 0x2ea0 | 0x1000 | 0x13400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.99 |
.rsrc | 0x417000 | 0x3f8 | 0x400 | 0x14400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.96 |
.reloc | 0x418000 | 0x1666 | 0x1800 | 0x14800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 5.99 |
C:\588bce7c90097ed212\SplashScreen.bmp | Modified File | Stream |
Unknown
|
...
|
»
C:\588bce7c90097ed212\sqmapi.dll | Modified File | Binary |
Unknown
|
...
|
»
PE Information
»
Image Base | 0x6cd00000 |
Entry Point | 0x6cd01ba2 |
Size Of Code | 0x1e400 |
Size Of Initialized Data | 0x2400 |
File Type | FileType.dll |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2006-11-02 09:44:16+00:00 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x6cd01000 | 0x1e3af | 0x1e400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.93 |
.data | 0x6cd20000 | 0x580 | 0x600 | 0x1e800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.97 |
.rsrc | 0x6cd21000 | 0x400 | 0x400 | 0x1ee00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.96 |
.reloc | 0x6cd22000 | 0x1808 | 0x1a00 | 0x1f200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 5.99 |
Exports (45)
»
Api name | EAT Address | Ordinal |
---|---|---|
SqmAddToAverage | 0x16fc6 | 0x1 |
SqmAddToStream | 0x176f3 | 0x2 |
SqmAddToStreamDWord | 0xa727 | 0x3 |
SqmAddToStreamString | 0xb20b | 0x4 |
SqmAddToStreamV | 0x175b1 | 0x5 |
SqmCleanup | 0x1e75 | 0x6 |
SqmClearFlags | 0x1707d | 0x7 |
SqmCreateNewId | 0x16618 | 0x8 |
SqmEndSession | 0xabd9 | 0x9 |
SqmFlushSession | 0x16a5e | 0xa |
SqmGetEnabled | 0x16b90 | 0xb |
SqmGetFlags | 0xae65 | 0xc |
SqmGetMachineId | 0x173ed | 0xd |
SqmGetSession | 0x32bc | 0xe |
SqmGetSessionStartTime | 0x169ad | 0xf |
SqmGetUserId | 0x174cf | 0x10 |
SqmIncrement | 0x16f0f | 0x11 |
SqmIsWindowsOptedIn | 0x3fbf | 0x12 |
SqmReadSharedMachineId | 0x2e0f | 0x13 |
SqmReadSharedUserId | 0x3d03 | 0x14 |
SqmSet | 0x31ea | 0x15 |
SqmSetAppId | 0x3da3 | 0x16 |
SqmSetAppVersion | 0xb16c | 0x17 |
SqmSetBits | 0x16cea | 0x18 |
SqmSetBool | 0x9d65 | 0x19 |
SqmSetCurrentTimeAsUploadTime | 0x166a1 | 0x1a |
SqmSetEnabled | 0xaf13 | 0x1b |
SqmSetFlags | 0x3805 | 0x1c |
SqmSetIfMax | 0x16da1 | 0x1d |
SqmSetIfMin | 0x16e58 | 0x1e |
SqmSetMachineId | 0x38b9 | 0x1f |
SqmSetString | 0xafa2 | 0x20 |
SqmSetUserId | 0x39bd | 0x21 |
SqmStartSession | 0x16c3d | 0x22 |
SqmStartUpload | 0x4197 | 0x23 |
SqmSysprepGeneralize | 0x15fe4 | 0x24 |
SqmSysprepSpecialize | 0x1616d | 0x25 |
SqmTimerAccumulate | 0x1728d | 0x26 |
SqmTimerAddToAverage | 0x1733d | 0x27 |
SqmTimerRecord | 0x171dd | 0x28 |
SqmTimerStart | 0x1712d | 0x29 |
SqmUnattendedSetup | 0x161d8 | 0x2a |
SqmWaitForUploadComplete | 0xbb1c | 0x2b |
SqmWriteSharedMachineId | 0x16327 | 0x2c |
SqmWriteSharedUserId | 0x16513 | 0x2d |
C:\Logs\Security.evtx[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\System.evtx[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Stream |
Unknown
|
...
|
»
C:\Logs\Windows PowerShell.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\DESIGNER\MSADDNDR.OLB[id-qKCXbrQ9].[paradise@all-ransomware.info].PRT | Dropped File | Binary |
Unknown
|
...
|
»
C:\Users\FD1HVy\Documents\DecryptionInfo.auth | Dropped File | Text |
Unknown
|
...
|
»
C:\Boot\bg-BG\#DECRYPT MY FILES#.html | Dropped File | Text |
Unknown
|
...
|
»
Embedded URLs (2)
»
URL | First Seen | Categories | Threat Names | Reputation Status | WHOIS Data |
---|---|---|---|---|---|
https://localbitcoins.com/buy_bitcoins/ | - | - | - |
Unknown
|
Not Queried
|
http://www.coindesk.com/information/how-can-i-buy-bitcoins/ | - | - | - |
Unknown
|
Not Queried
|