Static | ZeroBOX

PE Compile Time

2024-10-15 14:37:17

PDB Path

C:\Users\MALDEV01\Desktop\Evasion\code_test\CVE-2024-35250\x64\Release\CVE-2024-35250.pdb

PE Imphash

bf7918872fb2635d90e4d340ebeca011

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00016580 0x00016600 6.51767913849
.rdata 0x00018000 0x0000ac56 0x0000ae00 5.03078752206
.data 0x00023000 0x00001c50 0x00000c00 1.9280389494
.pdata 0x00025000 0x000013f8 0x00001400 5.13072581583
_RDATA 0x00027000 0x0000015c 0x00000200 2.78676102564
.rsrc 0x00028000 0x000001e0 0x00000200 4.71229819329
.reloc 0x00029000 0x00000678 0x00000800 4.91324789772

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x00028060 0x0000017d LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library KERNEL32.dll:
0x140018000 HeapFree
0x140018008 GetCurrentProcess
0x140018010 DeviceIoControl
0x140018018 VirtualAlloc
0x140018020 GetCurrentThreadId
0x140018028 OpenProcess
0x140018030 GetLastError
0x140018038 HeapReAlloc
0x140018040 CloseHandle
0x140018048 HeapAlloc
0x140018050 GetProcAddress
0x140018058 GetCurrentProcessId
0x140018060 GetProcessHeap
0x140018068 OpenThread
0x140018070 LoadLibraryExW
0x140018078 CreateFileW
0x140018080 HeapSize
0x140018088 SetFilePointerEx
0x140018090 GetFileSizeEx
0x140018098 RtlCaptureContext
0x1400180a0 RtlLookupFunctionEntry
0x1400180a8 RtlVirtualUnwind
0x1400180b0 UnhandledExceptionFilter
0x1400180c0 TerminateProcess
0x1400180d0 QueryPerformanceCounter
0x1400180d8 GetSystemTimeAsFileTime
0x1400180e0 InitializeSListHead
0x1400180e8 IsDebuggerPresent
0x1400180f0 GetStartupInfoW
0x1400180f8 GetModuleHandleW
0x140018100 RtlUnwindEx
0x140018108 SetLastError
0x140018110 EnterCriticalSection
0x140018118 LeaveCriticalSection
0x140018120 DeleteCriticalSection
0x140018130 TlsAlloc
0x140018138 TlsGetValue
0x140018140 TlsSetValue
0x140018148 TlsFree
0x140018150 FreeLibrary
0x140018158 EncodePointer
0x140018160 RaiseException
0x140018168 RtlPcToFileHeader
0x140018170 GetStdHandle
0x140018178 WriteFile
0x140018180 GetModuleFileNameW
0x140018188 ExitProcess
0x140018190 GetModuleHandleExW
0x140018198 GetCommandLineA
0x1400181a0 GetCommandLineW
0x1400181a8 FlsAlloc
0x1400181b0 FlsGetValue
0x1400181b8 FlsSetValue
0x1400181c0 FlsFree
0x1400181c8 CompareStringW
0x1400181d0 LCMapStringW
0x1400181d8 GetFileType
0x1400181e0 WaitForSingleObject
0x1400181e8 GetExitCodeProcess
0x1400181f0 CreateProcessW
0x1400181f8 GetFileAttributesExW
0x140018200 FindClose
0x140018208 FindFirstFileExW
0x140018210 FindNextFileW
0x140018218 IsValidCodePage
0x140018220 GetACP
0x140018228 GetOEMCP
0x140018230 GetCPInfo
0x140018238 MultiByteToWideChar
0x140018240 WideCharToMultiByte
0x140018248 GetEnvironmentStringsW
0x140018250 FreeEnvironmentStringsW
0x140018258 SetEnvironmentVariableW
0x140018260 SetStdHandle
0x140018268 GetStringTypeW
0x140018270 FlushFileBuffers
0x140018278 GetConsoleOutputCP
0x140018280 GetConsoleMode
0x140018288 WriteConsoleW
Library ksproxy.ax:
0x140018298 KsOpenDefaultDevice
Library ntdll.dll:
0x1400182a8 NtQuerySystemInformation
0x1400182b0 NtWriteVirtualMemory

!This program cannot be run in DOS mode.
`.rdata
@.data
.pdata
@_RDATA
@.rsrc
@.reloc
L$ SVWH
t$ WAVAWH
\$Xfff
0A_A^_
u893vG
\$ UWATH
u/HcH<H
A:8ucI
t&A88t
WATAUAVAWH
A_A^A]A\_
fffffff
ffffff
vKfffff
WATAUAVAWH
A_A^A]A\_
VWATAVAWH
A_A^A\_^
WATAUAVAWH
A_A^A]A\_
H;xXu5
ffffff
fffffff
AUAVAWH
u4I9}(
;I9}(tiH
0A_A^A]
UVWATAUAVAWH
`A_A^A]A\_^]
@USVWATAUAVAWH
A_A^A]A\_^[]
UVWATAUAVAWH
A_A^A]A\_^]
@SVWATAUAVAWH
L!|$(L!
D$0HcH
pA_A^A]A\_^[
B(I9A(
SVWATAUAVAWH
0A_A^A]A\_^[
t$ WATAUAVAWH
A_A^A]A\_
x AUAVAWH
0A_A^A]
x UAVAWH
D$@H;F
kL@8o(u
<htl<jt\<lt4<tt$<wt
|$ UATAUAVAWH
<Ct-<D
<St[A:
u<g~l<it[<ntP<ot,<pt
<utK@:
{,D+{HD+
A_A^A]A\]
WAVAWH
~,*u<I
A_A^_
x ATAVAWH
A_A^A\
UVWAVAWH
0A_A^_^]
p0R^G'
u3HcH<H
t$ WAVAWH
A_A^_
WAVAWH
A_A^_
D$0@8{
p*W4H
p*W4H
WATAUAVAWH
A_A^A]A\_
p0R^G'
L$ VWAVH
fD9t$b
WATAUAVAWH
gfffffffH
A_A^A]A\_
{ AUAVAWH
0A_A^A]
t$xt*3
WAVAWH
A_A^_
x ATAVAWH
A_A^A\
L$ VWAVH
fD94H}aD
WATAUAVAWH
0A_A^A]A\_
x UAVAWH
t(LcuoH;
UVWATAUAVAWH
A_A^A]A\_^]
@USVWATAUAVAWH
xA_A^A]A\_^[]
u$D8r(t
D81uUL9r
uED8r(t
vAD8s(t
u$D8r(t
fD91uTL9r
uED8r(t
v@D8s(t
UVWATAUAVAWH
PA_A^A]A\_^]
WATAUAVAWH
0A_A^A]A\_
H97u+A
@USVWATAUAVH
D8t$ht
D8t$ht
A^A]A\_^[]
f9)u4H9j
u%@8j(t
l$ VWATAVAWH
L$&8\$&t,8Y
A_A^A\_^
UVWATAUAVAWH
xWI96tRI
0A_A^A]A\_^]
@UATAUAVAWH
e0A_A^A]A\]
\$ VWATAUAVH
D!l$xA
@A^A]A\_^
WAVAWH
A_A^_
UVWATAUAVAWH
fB9<A}1L
A_A^A]A\_^]
VWATAVAW
A_A^A\_^
AUAVAWH
@A_A^A]
@USVWATAUAVAWH
H!D$ I
hA_A^A]A\_^[]
x ATAVAWH
0A_A^A\
SUVWATAVAWH
A_A^A\_^][
@USVWATAVAWH
A_A^A\_^[]
WATAUAVAWH
0A_A^A]A\_
D$0H9D$8
UVWATAUAVAWH
L9#t!H
:u A8N
pA_A^A]A\_^]
t$ WATAUAVAWH
0A_A^A]A\_
UATAUAVAWH
D8l$pt
D8l$pt
D8l$pt
D8l$pt
D8l$pt
D8l$pt
D8l$ptGH
D8l$pt
D8l$pt
A_A^A]A\]
ATAUAVH
L$ fff
L$ |+L;
A^A]A\
@UATAUAVAWH
H!T$0D
u,!T$(H!T$
A_A^A]A\]
x UAVAWH
AUAVAWH
@A_A^A]
ffffff
fffffff
@SUVWATAVAWH
@A_A^A\_^][
@USVWATAUAVAWH
eHA_A^A]A\_^[]
ATAVAWH
A_A^A\
USVWAVH
A^_^[]
LcA<E3
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__swift_1
__swift_2
__swift_3
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
operator co_await
operator<=>
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
`anonymous namespace'
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
Unknown exception
bad exception
(null)
COMSPEC
cmd.exe
CorExitProcess
AreFileApisANSI
CompareStringEx
LCMapStringEx
LocaleNameToLCID
AppPolicyGetProcessTerminationMethod
NAN(SNAN)
nan(snan)
NAN(IND)
nan(ind)
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
[aOni*{
~ $s%r
@b;zO]
v2!L.2
1#QNAN
1#SNAN
UUUUUU
UUUUUU
=imb;D
/>58d%
VM>cQ6
>jtm}S
)>6{1n
+f)>0'
;H9>&X
*StO9>T
n03>Pu
K~Je#>!
bp(=>?g
BC?>6t9^
K&>.yC
.xJ>Hf
y\PD>!
|b=})>
c [1>H'
uzKs@>
3>N;kU
kE>fvw
V6E>`"(5
?UUUUUU
?7zQ6$
[-] AllocateBitmap failed with error: %d
[+] Fake RTL_BITMAP allocated at address = %p
[-] NtQuerySystemInformation failed. (NTSTATUS code: 0x%X)
ntoskrnl.exe
[-] leak_gadget_address failed
[-] KsOpenDefaultDevice at index %d failed with error = %x
[+] DRM device handle value = %p
[+] System EPROCESS address: %llx
[+] Current KTHREAD address: %llx
[+] Current EPROCESS address: %llx
[+] ntoskrnl.exe base address = %llx
RtlClearAllBits
[!] RtlClearAllBits kernel address = %p
[-] DeviceIoControl failed
[!] Leveraging DKOM to achieve LPE
[!] Calling Write64 wrapper to overwrite current EPROCESS->Token
cmd.exe
C:\Users\MALDEV01\Desktop\Evasion\code_test\CVE-2024-35250\x64\Release\CVE-2024-35250.pdb
.text$mn
.text$mn$00
.text$x
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$r
.rdata$voltmd
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.data$r
.data$rs
.pdata
_RDATA
.rsrc$01
.rsrc$02
HeapFree
GetCurrentProcess
DeviceIoControl
VirtualAlloc
GetCurrentThreadId
OpenProcess
GetLastError
HeapReAlloc
CloseHandle
HeapAlloc
GetProcAddress
GetCurrentProcessId
GetProcessHeap
OpenThread
LoadLibraryExW
KERNEL32.dll
KsOpenDefaultDevice
ksproxy.ax
NtQuerySystemInformation
NtWriteVirtualMemory
ntdll.dll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
EncodePointer
RaiseException
RtlPcToFileHeader
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
GetFileType
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
HeapSize
CreateFileW
WriteConsoleW
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVbad_exception@std@@
.?AVexception@std@@
.?AVtype_info@@
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
api-ms-
(null)
mscoree.dll
api-ms-win-core-datetime-l1-1-1
api-ms-win-core-file-l1-2-2
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
advapi32
api-ms-win-appmodel-runtime-l1-1-2
user32
ext-ms-
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
((((( H
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
CONOUT$
ntoskrnl.exe
Antivirus Signature
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
Elastic Windows.Exploit.Generic
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Clean
ALYac Trojan.GenericKD.74330892
Cylance Unsafe
Sangfor Clean
CrowdStrike win/malicious_confidence_70% (D)
Alibaba Exploit:Application/CVE-2022-21882.8204c58b
K7GW Clean
K7AntiVirus Clean
huorong Clean
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 Clean
APEX Malicious
Avast Clean
Cynet Malicious (score: 100)
Kaspersky Clean
BitDefender Trojan.GenericKD.74330892
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Trojan.GenericKD.74330892
Tencent Clean
Sophos Clean
F-Secure Clean
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfeeD ti!308AF6A404D8
Trapmine Clean
CTX exe.trojan.generic
Emsisoft Trojan.GenericKD.74330892 (B)
Ikarus Exploit.CVE-2022-21882
FireEye Trojan.GenericKD.74330892
Jiangmin Clean
Webroot Clean
Varist W64/ABApplication.MSTJ-1165
Avira Clean
Fortinet W32/PossibleThreat
Antiy-AVL GrayWare/Win32.Wacapew
Kingsoft Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Generic.D46E330C
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Program:Win32/Wacapew.C!ml
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5683953
Acronis Clean
McAfee Artemis!F8576551EC4F
TACHYON Clean
VBA32 Clean
Malwarebytes Generic.Malware/Suspicious
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Clean
Rising Clean
Yandex Clean
SentinelOne Static AI - Suspicious PE
MaxSecure Trojan.Malware.300983.susgen
GData Trojan.GenericKD.74330892
AVG Clean
DeepInstinct MALICIOUS
alibabacloud Clean
No IRMA results available.