Static | ZeroBOX

PE Compile Time

2024-05-30 10:25:35

PE Imphash

d4aa9ed1c24f35a9649cb4146576e0ec

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000014a2 0x00001600 5.82275540787
.rdata 0x00003000 0x0000200a 0x00002200 3.79635273347
.data 0x00006000 0x000009a8 0x00000600 3.44863441277
.rsrc 0x00007000 0x000002b0 0x00000400 5.19021307251
.reloc 0x00008000 0x000004ca 0x00000600 5.09860263432

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x00007058 0x00000256 LANG_ENGLISH SUBLANG_ENGLISH_US ASCII text, with CRLF line terminators

Imports

Library MSVCR90.dll:
0x403090 _crt_debugger_hook
0x403094 _controlfp_s
0x403098 _invoke_watson
0x4030a0 _decode_pointer
0x4030a4 _onexit
0x4030a8 _lock
0x4030ac __dllonexit
0x4030b0 _unlock
0x4030b4 ?terminate@@YAXXZ
0x4030b8 __set_app_type
0x4030bc _encode_pointer
0x4030c0 memset
0x4030c4 __p__fmode
0x4030c8 __p__commode
0x4030cc _adjust_fdiv
0x4030d0 __setusermatherr
0x4030d4 _configthreadlocale
0x4030d8 _initterm_e
0x4030dc _initterm
0x4030e0 _acmdln
0x4030e4 exit
0x4030e8 _ismbblead
0x4030ec _XcptFilter
0x4030f0 _exit
0x4030f4 _cexit
0x4030f8 __getmainargs
0x4030fc _amsg_exit
0x403100 srand
0x403104 rand
0x403108 mbstowcs
Library MPR.dll:
0x403084 WNetAddConnection2W
Library WS2_32.dll:
0x403140 WSAStartup
0x403144 inet_addr
0x403148 ioctlsocket
0x40314c select
0x403150 htons
0x403154 socket
0x403158 closesocket
0x40315c gethostbyname
0x403160 connect
Library WININET.dll:
0x40312c InternetReadFile
0x403130 InternetCloseHandle
0x403134 InternetOpenUrlW
0x403138 InternetOpenW
Library SHLWAPI.dll:
0x403118 PathFindFileNameW
Library urlmon.dll:
0x403168 URLDownloadToFileW
Library KERNEL32.dll:
0x403014 GetModuleFileNameW
0x403018 CopyFileW
0x40301c Sleep
0x403020 WriteFile
0x403024 GetTickCount
0x403028 CreateProcessW
0x40302c ExitProcess
0x403030 DeleteFileW
0x403034 CreateThread
0x40303c InterlockedExchange
0x403040 CreateFileW
0x403044 GetStartupInfoA
0x403050 GetCurrentThreadId
0x403054 GetCurrentProcessId
0x40305c TerminateProcess
0x403060 GetCurrentProcess
0x403068 IsDebuggerPresent
0x40306c ExitThread
0x403070 GetLastError
0x403074 CreateMutexA
0x40307c CloseHandle
Library USER32.dll:
0x403120 wsprintfA
0x403124 wsprintfW
Library ADVAPI32.dll:
0x403000 OpenSCManagerW
0x403004 CloseServiceHandle
0x403008 CreateServiceW
0x40300c StartServiceA
Library SHELL32.dll:
0x403110 ShellExecuteW

!This program cannot be run in DOS mode.
`.rdata
@.data
@.reloc
%d.%d.%d.%d
mbstowcs
MSVCR90.dll
_amsg_exit
__getmainargs
_cexit
_XcptFilter
_ismbblead
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
?terminate@@YAXXZ
_unlock
__dllonexit
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
WNetAddConnection2W
WNetCancelConnectionW
MPR.dll
WS2_32.dll
InternetOpenW
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
WININET.dll
PathFindFileNameW
SHLWAPI.dll
URLDownloadToFileW
urlmon.dll
ExitProcess
CreateProcessW
GetTickCount
WriteFile
CopyFileW
GetModuleFileNameW
CreateFileW
ExitThread
GetLastError
CreateMutexA
CloseHandle
DeleteFileW
CreateThread
ExpandEnvironmentStringsW
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
KERNEL32.dll
wsprintfW
wsprintfA
USER32.dll
CreateServiceW
CloseServiceHandle
OpenSCManagerW
StartServiceA
ADVAPI32.dll
ShellExecuteW
SHELL32.dll
memset
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
<dependency>
<dependentAssembly>
<assemblyIdentity type="win32" name="Microsoft.VC90.CRT" version="9.0.21022.8" processorArchitecture="x86" publicKeyToken="1fc8b3b9a1e18e3b"></assemblyIdentity>
</dependentAssembly>
</dependency>
</assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDING
V0c0s0y0
071G1Z1b1|1
3&3Q3^3k3v3
707>7K7P7
7b9l9t9
<&<:<Q<m<w<
=,=1=n=x=~=
>)>/>x>~>
>D?J?T?[?f?l?
0>0C0b0
11=1Q1W1
3"3(383>3D3T3Z3`3f3l3r3y3
44%4+4A4H4P4V4\4b4h4n4t4z4
8 8(8,8H8d8h8
0 0(0,0004080<0@0D0H0L0P0T0X0\0`0d0h0l0p0t0x0|0
1 1$1(1,1014181<1@1D1H1L1P1T1X1\1`1d1h1l1p1t1x1|1
2 2$2(2,2024282<2@2D2H2L2P2T2X2\2`2d2h2l2p2t2x2|2
3 3$3(3,3034383<3@3D3H3L3P3T3X3\3`3d3h3l3p3t3x3|3
Administrator
administrator
Administrator
administrator
admin1
admin123
password
Password
password1
password12
password123
pass12
pass123
passwd
1234567890
123456789
12345678
1234567
123456
1q2w3e
1234abcd
1234qwer
a1b2c3
abc123
academia
access
account
anything
asddsa
asdfgh
asdzxc
backup
boss123
business
campus
changeme
cluster
codename
codeword
coffee
controller
cookie
customer
database
default
desktop
domain
example
exchange
explorer
foobar
foofoo
forever
freedom
home123
ihavenopass
Internet
intranet
killer
letitbe
letmein
love123
manager
market
monitor
mypass
mypassword
mypc123
nobody
nopass
nopassword
nothing
office
oracle
private
public
q1w2e3
qazwsx
qazwsxedc
qwe123
qweasd
qweasdzxc
qweewq
qwerty
root123
rootroot
sample
secret
secure
security
server
shadow
student
superuser
supervisor
system
temp123
temporary
temptemp
test123
testtest
unknown
windows
work123
zxccxz
zxcvbn
00000000
0000000
0987654321
11111111
1111111
111111
123123
123321
123abc
123asd
123qwe
22222222
2222222
222222
33333333
3333333
333333
44444444
4444444
444444
55555555
5555555
555555
654321
66666666
6666666
666666
7654321
77777777
7777777
777777
87654321
88888888
8888888
888888
987654321
99999999
9999999
999999
winsyscfg.exe
Windows\All Users\StartMenu\Programs\Startup\winsyscfg.exe
Windows\StartMenu\Programs\Startup\winsyscfg.exe
WINNT\Profiles\All Users\StartMenu\Programs\Startup\winsyscfg.exe
%userprofile%
ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\winsyscfg.exe
Users\All Users\Microsoft\Windows\Start Menu\Programs\winsyscfg.exe
Documents and Settings\All Users\StartMenu\Programs\Startup\winsyscfg.exe
http://185.215.113.66/admin.php?s=%s|%s|%s
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.82 Safari/537.36
%temp%
%s\%d%d.exe
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36
%s:Zone.Identifier
%s\%d%d.exe
%s:Zone.Identifier
%s\24642664.jpg
\\%s\ADMIN$
%s\winsyscfg.exe
suckmadick
suckmadick
winsyscfg.exe
http://twizt.net/netbiosworm.exe
\\121.52.212.161\Admin$\winsyscfg.exe
suckmadick
suckmadick
\\121.52.212.161
No antivirus signatures available.
No IRMA results available.