Static | ZeroBOX

PE Compile Time

2021-08-14 05:15:24

PDB Path

hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh

PE Imphash

e28242db9ee32a240d22ee7a94384b35

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0001ead5 0x0001ec00 6.39914331753
.rdata 0x00020000 0x00004a7a 0x00004c00 5.25947590655
.data 0x00025000 0x000226c8 0x00020c00 0.386622256623
.rsrc 0x00048000 0x000001b4 0x00000200 5.09962545963
.reloc 0x00049000 0x00002028 0x00002200 4.23169294389

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x00048058 0x0000015a LANG_ENGLISH SUBLANG_ENGLISH_US ASCII text, with CRLF line terminators

Imports

Library urlmon.dll:
0x4203a4 URLDownloadToFileW
Library KERNEL32.dll:
0x420048 GetTickCount
0x420060 SwitchToThread
0x420068 GetModuleFileNameW
0x42006c TerminateThread
0x420074 DeleteFileW
0x420078 FlushViewOfFile
0x42007c GetCurrentProcessId
0x420080 GetCurrentThreadId
0x42008c Sleep
0x420090 HeapAlloc
0x420094 HeapReAlloc
0x420098 GetProcessHeap
0x42009c HeapFree
0x4200a0 OpenProcess
0x4200a4 FindClose
0x4200a8 FindNextFileW
0x4200ac FindFirstFileW
0x4200b0 LocalFree
0x4200b4 CreateProcessW
0x4200b8 lstrcmpiW
0x4200bc FlushFileBuffers
0x4200c0 WriteFile
0x4200c4 GetLastError
0x4200c8 SetFilePointer
0x4200cc GetFileSizeEx
0x4200d0 ReleaseMutex
0x4200d4 CreateMutexW
0x4200d8 GetNativeSystemInfo
0x4200dc MultiByteToWideChar
0x4200e0 WideCharToMultiByte
0x4200e4 GetModuleHandleW
0x4200f0 ExitProcess
0x4200f4 CopyFileW
0x4200f8 SetFileAttributesW
0x4200fc CreateDirectoryW
0x420100 lstrcmpW
0x420104 GlobalFree
0x420108 GlobalUnlock
0x42010c GlobalLock
0x420110 GlobalAlloc
0x420114 MoveFileExW
0x420118 GetDriveTypeW
0x42011c DeviceIoControl
0x420124 GetSystemDirectoryW
0x42012c FindVolumeClose
0x420130 FindNextVolumeW
0x420134 FindFirstVolumeW
0x420138 CreateFileA
0x42013c GetLocaleInfoA
0x420140 GetStringTypeW
0x420144 GetStringTypeA
0x420148 LCMapStringW
0x42014c LCMapStringA
0x420150 WriteConsoleW
0x420154 GetConsoleOutputCP
0x420158 WriteConsoleA
0x42015c SetStdHandle
0x420160 HeapSize
0x420168 lstrcatW
0x42016c GetExitCodeThread
0x420170 lstrlenW
0x420174 UnmapViewOfFile
0x420178 CreateFileW
0x42017c GetFileSize
0x420180 CreateFileMappingW
0x420184 MapViewOfFile
0x420188 LoadLibraryA
0x42018c GetProcAddress
0x420194 lstrcpynW
0x420198 WaitForSingleObject
0x42019c TerminateProcess
0x4201a0 CloseHandle
0x4201a4 lstrlenA
0x4201a8 GetThreadId
0x4201ac ExitThread
0x4201b0 CreateThread
0x4201b8 RtlUnwind
0x4201bc GetCurrentProcess
0x4201c8 IsDebuggerPresent
0x4201cc IsValidCodePage
0x4201d0 GetOEMCP
0x4201d4 GetACP
0x4201d8 GetCPInfo
0x4201dc RaiseException
0x4201e0 GetCommandLineA
0x4201e4 GetStartupInfoA
0x4201e8 GetConsoleMode
0x4201ec GetConsoleCP
0x4201f4 GetFileType
0x4201f8 SetHandleCount
0x42020c GetModuleFileNameA
0x420210 GetStdHandle
0x420218 SetLastError
0x420220 TlsFree
0x420224 TlsSetValue
0x420228 TlsAlloc
0x42022c TlsGetValue
0x420230 VirtualAlloc
0x420234 VirtualFree
0x420238 HeapCreate
Library USER32.dll:
0x4202b0 EmptyClipboard
0x4202b4 DefWindowProcW
0x4202b8 GetClipboardData
0x4202c0 DefWindowProcA
0x4202c4 DispatchMessageW
0x4202c8 GetShellWindow
0x4202d0 SetClipboardData
0x4202d4 TranslateMessage
0x4202d8 GetMessageW
0x4202dc RegisterClassExW
0x4202e0 wsprintfW
0x4202e4 UnregisterClassW
0x4202e8 DestroyWindow
0x4202f4 CreateWindowExW
0x4202f8 PostThreadMessageW
0x4202fc OpenClipboard
0x420300 CloseClipboard
0x420304 CharLowerW
Library ADVAPI32.dll:
0x420000 RegCloseKey
0x420004 RegOpenKeyExW
0x420008 RegCreateKeyExW
0x42000c RevertToSelf
0x42001c CryptReleaseContext
0x420020 CryptCreateHash
0x420024 CryptHashData
0x42002c CryptDestroyHash
0x420030 CryptImportKey
0x420034 CryptGetKeyParam
0x420038 CryptDestroyKey
0x42003c OpenProcessToken
0x420040 RegSetValueExW
Library SHELL32.dll:
0x420264 ShellExecuteExW
0x420268 None
0x42026c SHChangeNotify
0x420270 SHGetFolderPathW
0x420274 ShellExecuteW
Library ole32.dll:
0x420394 CoCreateInstance
0x420398 CoInitializeEx
0x42039c CoUninitialize
Library OLEAUT32.dll:
0x420250 SysFreeString
0x420254 SysAllocString
Library WS2_32.dll:
0x420338 htonl
0x42033c ntohl
0x420340 ntohs
0x420344 htons
0x420348 recvfrom
0x42034c setsockopt
0x420350 sendto
0x420354 inet_ntoa
0x420358 freeaddrinfo
0x42035c closesocket
0x420360 getsockname
0x420364 connect
0x420368 socket
0x42036c WSAGetLastError
0x420370 WSARecvFrom
0x420374 WSASendTo
0x420378 bind
0x42037c WSAStartup
0x420380 WSACleanup
0x420384 inet_addr
0x420388 WSASocketW
0x42038c getaddrinfo
Library SHLWAPI.dll:
0x42027c PathCombineW
0x420280 StrToIntA
0x420284 StrDupW
0x420288 PathFindExtensionW
0x42028c PathFileExistsW
0x420290 StrStrNIW
0x420294 StrCmpNIW
0x420298 StrStrIW
0x42029c PathAddExtensionW
0x4202a0 PathStripToRootW
0x4202a4 PathAppendW
0x4202a8 PathRemoveFileSpecW
Library MPR.dll:
0x420240 WNetCloseEnum
0x420244 WNetEnumResourceW
0x420248 WNetOpenEnumW
Library WININET.dll:
0x42030c InternetOpenUrlW
0x420310 InternetCrackUrlW
0x420314 InternetOpenW
0x420318 InternetConnectW
0x42031c HttpOpenRequestW
0x420324 HttpSendRequestW
0x420328 HttpQueryInfoW
0x42032c InternetReadFile
0x420330 InternetCloseHandle
Library RPCRT4.dll:
0x42025c UuidCreate

!This program cannot be run in DOS mode.
`.rdata
@.data
@.reloc
PE;QEuUh
QQSVWd
0WWWWW
0WWWWW
uL9=(\D
teh3zA
HtHu4j
s[S;7|G;w
tR99u2
0SSSSS
>=Yt1j
j@j ^V
0A@@Ju
to= YD
URPQQh$
^SSSSS
j"^SSSSS
HHtYHHt
j hx5B
;t$,v-
UQPXY]Y[
0SSSSS
0SSSSS
GWh(!B
t"SS9]
FVh(!B
v$;5DYD
PPPPPPPP
PPPPPPPP
t+WWVPV
bad allocation
mapped_address
xor_mapped_address
changed_address
public address
local address
RtlGetVersion
NtQueryInformationToken
NtSetInformationThread
RtlFreeSid
NtDuplicateToken
NtSetInformationToken
NtFilterToken
NtOpenProcessToken
RtlLengthSid
RtlAllocateAndInitializeSid
RtlRandomEx
%s--%s
Content-Disposition: form-data; name="%s"
--%s--
ntdll.dll
Microsoft Enhanced Cryptographic Provider v1.0
Microsoft Enhanced Cryptographic Provider v1.0
sperm_mgr thread shutdown
%06u%06u%06u
domain,port,weekly_quality,type
domain,port,weekly_quality,type
%s,%u,%i,1
%s,%u,%u,2
too much peer data coming from this peer:
con_mgr thread shutdown
RtlGetVersion
ntdll.dll
ntdll.dll
RtlRandomEx
deque<T> too long
Fbad allocation
string too long
invalid string position
Unknown exception
(null)
`h````
xpxxxx
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
CorExitProcess
bad exception
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
`h`hhh
xppwpp
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
CONOUT$
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
URLDownloadToFileW
urlmon.dll
lstrlenA
CloseHandle
TerminateProcess
WaitForSingleObject
lstrcpynW
FileTimeToSystemTime
GetProcAddress
LoadLibraryA
MapViewOfFile
CreateFileMappingW
GetFileSize
CreateFileW
UnmapViewOfFile
lstrlenW
GetExitCodeThread
lstrcatW
CreateTimerQueueTimer
GetTickCount
DeleteTimerQueueTimer
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
SwitchToThread
CreateIoCompletionPort
GetModuleFileNameW
TerminateThread
PostQueuedCompletionStatus
DeleteFileW
FlushViewOfFile
GetCurrentProcessId
GetCurrentThreadId
GetQueuedCompletionStatus
WaitForMultipleObjects
HeapAlloc
HeapReAlloc
GetProcessHeap
HeapFree
OpenProcess
FindClose
FindNextFileW
FindFirstFileW
LocalFree
CreateProcessW
lstrcmpiW
FlushFileBuffers
WriteFile
GetLastError
SetFilePointer
GetFileSizeEx
ReleaseMutex
CreateMutexW
GetNativeSystemInfo
MultiByteToWideChar
WideCharToMultiByte
GetModuleHandleW
ExpandEnvironmentStringsW
GetThreadId
ExitProcess
CopyFileW
SetFileAttributesW
CreateDirectoryW
lstrcmpW
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
MoveFileExW
GetDriveTypeW
DeviceIoControl
GetVolumeNameForVolumeMountPointW
GetSystemDirectoryW
GetVolumeInformationW
FindVolumeClose
FindNextVolumeW
FindFirstVolumeW
KERNEL32.dll
CharLowerW
GetWindowThreadProcessId
GetShellWindow
DispatchMessageW
TranslateMessage
GetMessageW
RegisterClassExW
wsprintfW
UnregisterClassW
DestroyWindow
RemoveClipboardFormatListener
AddClipboardFormatListener
CreateWindowExW
PostThreadMessageW
OpenClipboard
CloseClipboard
SetClipboardData
EmptyClipboard
DefWindowProcW
GetClipboardData
GetPriorityClipboardFormat
DefWindowProcA
USER32.dll
OpenProcessToken
CryptDestroyKey
CryptGetKeyParam
CryptImportKey
CryptDestroyHash
CryptVerifySignatureA
CryptHashData
CryptCreateHash
CryptReleaseContext
CryptAcquireContextA
ConvertStringSecurityDescriptorToSecurityDescriptorW
ImpersonateLoggedOnUser
RevertToSelf
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
ADVAPI32.dll
ShellExecuteExW
ShellExecuteW
SHChangeNotify
SHGetFolderPathW
SHELL32.dll
CoUninitialize
CoCreateInstance
CoInitializeEx
ole32.dll
OLEAUT32.dll
freeaddrinfo
getaddrinfo
WSARecvFrom
WSASendTo
WSASocketW
WS2_32.dll
PathCombineW
PathRemoveFileSpecW
StrToIntA
StrDupW
PathFindExtensionW
PathFileExistsW
StrStrNIW
StrCmpNIW
StrStrIW
PathAddExtensionW
PathStripToRootW
PathAppendW
SHLWAPI.dll
WNetCloseEnum
WNetEnumResourceW
WNetOpenEnumW
MPR.dll
InternetCloseHandle
InternetReadFile
HttpQueryInfoW
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetConnectW
InternetOpenW
InternetCrackUrlW
InternetOpenUrlW
WININET.dll
UuidCreate
RPCRT4.dll
ExitThread
CreateThread
GetSystemTimeAsFileTime
RtlUnwind
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCommandLineA
GetStartupInfoA
HeapCreate
VirtualFree
VirtualAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
xR>}'?
stun.levigo.de
stun.b2b2c.ca
stun.1und1.de
stun.rolmail.net
stun.aa.net.uk
stun.ozekiphone.com
stun.nottingham.ac.uk
stun.epygi.com
stun.voip.aebc.com
stun.cognitoys.com
stun.anlx.net
stun.demos.ru
stun.siplogin.de
stun.bahnhof.net
stun.sipgate.net
stun.faktortel.com.au
stun.voxgratia.org
stun.voip.aebc.com
stun.rockenstein.de
stun.ozekiphone.com
stun.barracuda.com
stun.tng.de
stun.usfamily.net
stun.gmx.net
stun.gmx.de
stun.demos.su
stun.counterpath.net
stun.sigmavoip.com
stun.jabbim.cz
stun.aa.net.uk
stun.xten.com
stun.solnet.ch
stun.eoni.com
stun.crimeastar.net
stun.voztele.com
stun.cablenet-as.net
stun.voxgratia.org
stun.ivao.aero
stun.ekiga.net
stun.srce.hr
stun.russian-club.net
stun.callwithus.com
stun.nova.is
stun.infra.net
stun.halonet.pl
stun.comrex.com
stun.commpeak.com
stun.vivox.com
stun.xtratelecom.es
stun.pjsip.org
stun.nautile.nc
stun.voipgain.com
stun.schlund.de
stun.3cx.com
stun.mit.de
stun.aeta-audio.com
stun.callromania.ro
stun.12connect.com
stun.lundimatin.fr
stun.freeswitch.org
stun.nfon.net
stun.snafu.de
stun.aeta.com
stun.hosteurope.de
stun.zoiper.com
stun.tel.lu
stun.modulus.gr
stun.voip.eutelia.it
stun.fh-stralsund.de
stun.vo.lu
stun.twt.it
stun.rackco.com
time.windows.com
time-nw.nist.gov
time.nist.gov
time-a.nist.gov
time-b.nist.gov
us.pool.ntp.org
nist1-pa.ustiming.org
nist1-nj2.ustiming.org
79.141.72.52
79.141.72.138
79.141.72.156
.?AVlength_error@std@@
.?AVlogic_error@std@@
.?AVexception@std@@
.?AVbad_alloc@std@@
.?AVout_of_range@std@@
.?AVtype_info@@
.?AVbad_exception@std@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
0,1Y1A3]3
4$4Z425
:+<F<W<w<
B0R0\0~0
7.7Q7s7
9:8:B:W:{:
;W;d;q;P<Z<u=
=1>J>|?
<.<e<{<
1$191Z1
3>4P4_4l4
8&858Q8
8T:a:x:
4(4H5v5
7=7U7}7
7:8A8H8N8
:7<W<f<s<
293C3Z3~3
4*444^4
8C8P8|8
<)=9=H=W=_=y=
> >0>6>b>
?&?3?C?n?{?
0)060F0w0
1&171d1k1|1
3*3_3u3
8,8D8^8
91:>:]:
:+;9;t;
1 101D1U1i1u1
253>3D3g3
5-565@5^5t5
5*676S6`6
7!7<7O7v7{7
8&989N9e9j9v9
::4:~:
;#<G<X<n<
=8?U?b?}?
060U0x0~0
00161J1
1-2D2N2U2w2
2v4V668v>
(=F=p=
181B1_1p1z1
88#8'8+8/83878;8?8C8G8K8O8S8W8[8_8c8g8k8o8s8w8{8
9 9$9M9s9
:-;4;8;<;@;D;H;L;P;
<(<w<}<
1?1G1W1
3f3474<4
9!9(9,9094989<9@9D9
:,:3:8:<:@:a:
:*;0;4;8;<;
1,3Q3e3w3~3
2,5054585<5@5D5H5Y5u5
66I6W6]6
:3:8:G:P:]:h:z:
;;%;3;:;?;H;U;[;u;
0U2`2h2}2
4&5,585
7#7.7:7O7V7j7q7
8&80868B8Q8W8l8}8
9+9@9f9
<$<,<3<8<@<I<U<Z<_<e<i<o<t<z<
="=(=D=
>->A>G>
0$0>0J0R0b0w0
2`3i3u3
4(5A5j5o5
4!4*4j4o4
2 2$2(2,2024282>2G2g2l2
:!;&;G;L;r;
<#<)<0<7<><E<L<S<Z<b<j<r<~<
<I=V=o=
6 7M7`7f7
8+8@8J8p8
;&<1<;<T<^<q<
?5?=?E?\?u?
2(3W3x3
6.777L7|7
7h8q8w8
;1<?<E<U<Z<r<x<
<%=B=_=
1!101>1F1S1q1{1
2C2P2U2c2>3a3l3
3G4Y4f4r4|4
708:8R8Y8c8k8x8
<"<4<F<X<j<|<*>1>
1"1'1-141F1
4+6h6r6
:9:Q:z:
D0H0L0P0T0X0`0d0h0
0 1$1(1,101
0 0$0(0,0004080<0@0D0H0L0P0T0X0\0`0d0h0l0p0t0x0|0
:\;`;p;t;x;|;
<,<0<@<D<H<P<h<x<|<
=$=(=8=<=@=H=`=
><>H>h>t>
? ?(?,?0?8?L?T?h?p?
(000T0h0p0x0
1 1(1<1X1x1
2 2@2`2l2
34383H3l3x3
404L4P4l4p4
505P5l5p5
686X6x6
;(;,;P;`;d;|; >$>0>P>T>
?$?,?4?8?
8 8$8(8,8084888<8X8\8`8d8h8l8p8t8x8|8
9 9$9(9,9094989<9@9D9P9
Port %u
/quiet
wusa.exe
cmd.exe
3/c netsh advfirewall firewall show rule name="%s" || netsh firewall add allowedprogram mode=ENABLE profile=ALL name="%s" program="%s"
/c netsh advfirewall firewall show rule name="%s" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="%s" program="%s"
Accept-Encoding: identity
/c netsh advfirewall firewall show rule "Port %lu %s" || netsh firewall add portopening UDP %lu "Port %lu %s"
x/c netsh advfirewall firewall show rule "Port %lu %s" || netsh advfirewall firewall add rule name="Port %lu %s" dir=in action=allow protocol=UDP localport=%lu
/c netsh firewall set service type= upnp mode = enable
Content-Length: %u
Content-Type:multipart/form-data; boundary=%S
nS:(ML;;NW;;;LW)
%temp%
%ls\%d%d.exe
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
%ls:Zone.Identifier
%ls\%d%d.exe
%ls:Zone.Identifier
%userprofile%
System Volume Information
%windir%\system32\cmd.exe
(null)
KERNEL32.DLL
mscoree.dll
((((( H
h(((( H
H
x3x7x8x0x
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
winappmgr.exe
Windows Application Manager
Windows Application Manager
Windows Application Manager\stremcfg.bin
bitcoin:
[13][a-km-zA-HJ-NP-Z1-9]{25,34}|(bc1)[0-9A-Za-z]{39,59}
12HwDCzYe1CgnuJXmi85REzMS6ZwXsrkJ5
3Emi49QRuH6M77HPdk3dmvVZhMEwKRhXRx
bc1q9zxfs79ndrvych8v6hqcfl8xgkftma8uku4pyl
bitcoincash:
((bitcoincash|bchreg|bchtest):)?(q|p)[a-z0-9]{41}
bitcoincash:qp7dkrjpkrc296vlqw2lt33k7ycjl4lh9yq68uzaqp
ethereum:
(0x)[0-9A-Fa-f]{40}
0x7272121B7bF0Fc62B3Af9547d3d1c4e5F4EA1f2a
dogecoin:
(D|A|9)[a-km-zA-HJ-NP-Z1-9]{33,34}
DLWfFuQHRx9QqK1RUQiGLcSctZzpvz8AXU
[X|7][0-9A-Za-z]{33}
Xt9jAQdoXZoLnmqv3HXKVbVn5do4iCfKbV
monero:
[48][a-zA-Z|\d]{94}([a-zA-Z|\d]{11})?
446bbRpMQYCQm4jL9RmnTxPZKsrwntRWaKGNpbSpEVN8UpVktZGCCjYYZDjKG2xQhkRjfiGfiCxxv3rgasBJjyfkJARJ6JP
(A)[A-Za-z0-9]{33}
AMNEYRQXEvKouGABPB4bxcASM3hD97oryf
ripple:
r[0-9a-zA-Z]{33}
rw3Dm2KxwzxAtf865Dk6R8Rt9jZJVhPwTE
stellar:
G[ABCDEFGHIJKLMNOPQRSTUVWXYZ234567]{55}
GACV3NCXXTV5UFCHZVI7CLT7WGFNYSHN6F3F7SWTP2DIOVXLQLLLASEL
cosmos:
c[0-9a-zA-Z]{41,47}
cosmos1lv7l3c9fal8k3d7dsfc3m7ywhh0mj4xjpnr6ef
listk:
[0-9]{1,20}L
15284348885444593022L
polkadot:
1[0-9a-zA-Z]{47}
1434dZ4JZQPwWJoYJqCrQBYThb7s7vdFfH2yCHAYbmLMtroP
voldriver
/c start .\%s & start .\%s\%s
%SystemRoot%\system32\shell32.dll
voldriver.exe
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.Malicious.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.37397738
FireEye Generic.mg.39d6ec1892af37c0
CAT-QuickHeal Clean
McAfee Artemis!39D6EC1892AF
Cylance Clean
VIPRE Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Clean
BitDefender Trojan.GenericKD.37397738
K7GW Clean
Cybereason malicious.146cbb
BitDefenderTheta Gen:NN.ZexaE.34058.ruW@aGlBEvmi
Cyren Clean
Symantec ML.Attribute.HighConfidence
ESET-NOD32 Clean
Baidu Clean
APEX Malicious
Paloalto generic.ml
ClamAV Clean
Kaspersky HEUR:Trojan-Dropper.Win32.Sysn.gen
Alibaba Trojan:Win32/Starter.ali2000005
NANO-Antivirus Clean
ViRobot Clean
Rising Spyware.ClipBanker!1.D05A (CLASSIC)
Ad-Aware Trojan.GenericKD.37397738
TACHYON Clean
Emsisoft Trojan.GenericKD.37397738 (B)
Comodo Clean
F-Secure Clean
DrWeb Trojan.MulDrop18.27677
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Generic.dt
CMC Clean
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
GData Trojan.GenericKD.37397738
Jiangmin Clean
Webroot W32.Trojan.Gen
Avira Clean
Antiy-AVL Clean
Kingsoft Win32.Heur.KVMH017.a.(kcloud)
Gridinsoft Trojan.Win32.Agent.vb
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-Dropper.Win32.Sysn.gen
Microsoft Trojan:Script/Phonzy.C!ml
Cynet Malicious (score: 100)
AhnLab-V3 Clean
Acronis Clean
VBA32 Clean
ALYac Clean
MAX malware (ai score=99)
Malwarebytes Clean
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
Ikarus Clean
eGambit Clean
Fortinet Malicious_Behavior.SB
Qihoo-360 Win32/TrojanDropper.Sysn.HgIASaUA
Avast Clean
CrowdStrike win/malicious_confidence_60% (W)
MaxSecure Trojan.Malware.300983.susgen
No IRMA results available.