Static | ZeroBOX

PE Compile Time

2023-03-10 12:01:37

PE Imphash

4d331e861ce5ef9f1ddac1952e4ad3e5

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00015650 0x00015800 6.49533499727
.rdata 0x00017000 0x0000ab16 0x0000ac00 5.02723328564
.data 0x00022000 0x00001cd8 0x00000c00 1.98884714921
.pdata 0x00024000 0x000013b0 0x00001400 4.92740035145
_RDATA 0x00026000 0x000000fc 0x00000200 2.01280781475
.reloc 0x00027000 0x00000674 0x00000800 4.92363974079

Imports

Library KERNEL32.dll:
0x140017000 VirtualFree
0x140017008 VirtualAlloc
0x140017010 GetModuleHandleA
0x140017018 CreateEventW
0x140017020 GetLastError
0x140017028 CloseHandle
0x140017030 GetProcAddress
0x140017038 ReadFile
0x140017040 BuildIoRingReadFile
0x140017048 HeapFree
0x140017050 WriteFile
0x140017058 CreateNamedPipeW
0x140017060 CreateFileW
0x140017068 OpenProcess
0x140017070 HeapReAlloc
0x140017078 HeapAlloc
0x140017080 SubmitIoRing
0x140017088 GetCurrentProcessId
0x140017090 GetProcessHeap
0x140017098 PopIoRingCompletion
0x1400170a0 BuildIoRingWriteFile
0x1400170a8 CreateIoRing
0x1400170b0 WriteConsoleW
0x1400170b8 RtlCaptureContext
0x1400170c0 RtlLookupFunctionEntry
0x1400170c8 RtlVirtualUnwind
0x1400170d0 UnhandledExceptionFilter
0x1400170e0 GetCurrentProcess
0x1400170e8 TerminateProcess
0x1400170f8 QueryPerformanceCounter
0x140017100 GetCurrentThreadId
0x140017108 GetSystemTimeAsFileTime
0x140017110 InitializeSListHead
0x140017118 IsDebuggerPresent
0x140017120 GetStartupInfoW
0x140017128 GetModuleHandleW
0x140017130 RtlUnwindEx
0x140017138 SetLastError
0x140017140 EnterCriticalSection
0x140017148 LeaveCriticalSection
0x140017150 DeleteCriticalSection
0x140017160 TlsAlloc
0x140017168 TlsGetValue
0x140017170 TlsSetValue
0x140017178 TlsFree
0x140017180 FreeLibrary
0x140017188 LoadLibraryExW
0x140017190 EncodePointer
0x140017198 RaiseException
0x1400171a0 RtlPcToFileHeader
0x1400171a8 GetStdHandle
0x1400171b0 GetModuleFileNameW
0x1400171b8 ExitProcess
0x1400171c0 GetModuleHandleExW
0x1400171c8 GetCommandLineA
0x1400171d0 GetCommandLineW
0x1400171d8 FlsAlloc
0x1400171e0 FlsGetValue
0x1400171e8 FlsSetValue
0x1400171f0 FlsFree
0x1400171f8 CompareStringW
0x140017200 LCMapStringW
0x140017208 GetFileType
0x140017210 FindClose
0x140017218 FindFirstFileExW
0x140017220 FindNextFileW
0x140017228 IsValidCodePage
0x140017230 GetACP
0x140017238 GetOEMCP
0x140017240 GetCPInfo
0x140017248 MultiByteToWideChar
0x140017250 WideCharToMultiByte
0x140017258 GetEnvironmentStringsW
0x140017260 FreeEnvironmentStringsW
0x140017268 SetEnvironmentVariableW
0x140017270 SetStdHandle
0x140017278 GetStringTypeW
0x140017280 FlushFileBuffers
0x140017288 GetConsoleOutputCP
0x140017290 GetConsoleMode
0x140017298 GetFileSizeEx
0x1400172a0 SetFilePointerEx
0x1400172a8 HeapSize

!This program cannot be run in DOS mode.
`.rdata
@.data
.pdata
@_RDATA
@.reloc
L$ SVWH
|$ UAVAWH
AfdOE3
fD9<Xu
t H9-=(
t$ WAVAWH
\$Xfff
0A_A^_
@SUVAVH
H3E H3E
u0HcH<H
WATAUAVAWH
A_A^A]A\_
WATAUAVAWH
A_A^A]A\_
VWATAVAWH
A_A^A\_^
WATAUAVAWH
A_A^A]A\_
H;xXu5
ffffff
fffffff
AUAVAWH
u4I9}(
;I9}(tiH
0A_A^A]
UVWATAUAVAWH
`A_A^A]A\_^]
@USVWATAUAVAWH
A_A^A]A\_^[]
UVWATAUAVAWH
A_A^A]A\_^]
@SVWATAUAVAWH
L!|$(L!
D$0HcH
pA_A^A]A\_^[
B(I9A(u
SVWATAUAVAWH
0A_A^A]A\_^[
t$ WATAUAVAWH
A_A^A]A\_
WATAUAVAWH
0A_A^A]A\_
S(HcS0
S(HcS0
S(HcS0
x UAVAWH
D$@H;F
kL@8o(u
<htl<jt\<lt4<tt$<wt
UWATAVAWH
A_A^A\_]
WAVAWH
A_A^_
WATAUAVAWH
0A_A^A]A\_
WATAUAVAWH
A_A^A]A\_
UVWAVAWH
0A_A^_^]
p0R^G'
u3HcH<H
WAVAWH
A_A^_
WAVAWH
A_A^_
D$0@8{
p*W4H
p*W4H
WATAUAVAWH
A_A^A]A\_
p0R^G'
L$ VWAVH
fD9t$b
t$ WATAUAVAWH
gfffffffH
A_A^A]A\_
{ AUAVAWH
0A_A^A]
t$xt*3
WAVAWH
A_A^_
x ATAVAWH
A_A^A\
L$ VWAVH
fD94H}aD
u$D8r(t
D81uUL9r
uED8r(t
vAD8s(t
u$D8r(t
fD91uTL9r
uED8r(t
v@D8s(t
UVWATAUAVAWH
PA_A^A]A\_^]
WATAUAVAWH
0A_A^A]A\_
H9>u+A
@USVWATAUAVH
D8t$ht
D8t$ht
A^A]A\_^[]
f9)u4H9j
u%@8j(t
l$ VWATAVAWH
L$&8\$&t,8Y
A_A^A\_^
UVWATAUAVAWH
xWI96tRI
0A_A^A]A\_^]
@UATAUAVAWH
e0A_A^A]A\]
t$ WATAUAVAWH
D!|$xA
A_A^A]A\_
WAVAWH
A_A^_
UVWATAUAVAWH
fB9<I}1L
A_A^A]A\_^]
VWATAVAW
A_A^A\_^
VATAUAVAWH
0A_A^A]A\^
@USVWATAUAVAWH
H!D$ H
xA_A^A]A\_^[]
SUVWATAVAWH
A_A^A\_^][
@USVWATAVAWH
A_A^A\_^[]
WATAUAVAWH
0A_A^A]A\_
D$0H9D$8
ATAUAVH
L$ fff
L$ |+L;
A^A]A\
@UATAUAVAWH
A_A^A]A\]
x UAVAWH
VATAUAVAWH
0A_A^A]A\^
ffffff
fffffff
@SUVWATAVAWH
@A_A^A\_^][
@USVWATAUAVAWH
eHA_A^A]A\_^[]
ATAVAWH
A_A^A\
USVWAVH
A^_^[]
LcA<E3
u HcA<H
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__swift_1
__swift_2
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
operator co_await
operator<=>
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
`anonymous namespace'
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
Unknown exception
bad exception
(null)
CorExitProcess
AreFileApisANSI
CompareStringEx
LCMapStringEx
LocaleNameToLCID
AppPolicyGetProcessTerminationMethod
NAN(SNAN)
nan(snan)
NAN(IND)
nan(ind)
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
[aOni*{
~ $s%r
@b;zO]
v2!L.2
1#QNAN
1#SNAN
UUUUUU
UUUUUU
=imb;D
/>58d%
VM>cQ6
>jtm}S
)>6{1n
+f)>0'
;H9>&X
*StO9>T
n03>Pu
K~Je#>!
bp(=>?g
BC?>6t9^
K&>.yC
.xJ>Hf
y\PD>!
|b=})>
c [1>H'
uzKs@>
3>N;kU
kE>fvw
V6E>`"(5
?UUUUUU
?7zQ6$
NtCreateFile
ntdll.dll
NtDeviceIoControlFile
NtCreateIoCompletion
NtSetIoCompletion
NtQuerySystemInformation
usage:
exp.exe <pid>
[!] Attempting to elevate pid %i
[-] Failed to get address of NT functions: %0x
[-] IORING setup failed: %0x
[+] IoRing Obj Address at %llx
[-] IoRing->RegBuffers overwrite failed: %0x
[+] IoRing->RegBuffers overwritten with address 0x1000000
[-] IoRing->RegBuffersCount overwrite failed: %0x
[+] IoRing->RegBuffersCount overwritten with 0x1
[-] LPE Failed: %0x
[+] Target process token elevated to SYSTEM!
[+] System EPROC address: %llx
[+} Target process EPROC address: %llx
[+] System token is at: %llx
.text$mn
.text$mn$00
.text$x
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$r
.rdata$voltmd
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.data$r
.data$rs
.pdata
_RDATA
VirtualFree
VirtualAlloc
GetModuleHandleA
CreateEventW
GetLastError
CloseHandle
GetProcAddress
ReadFile
BuildIoRingReadFile
HeapFree
WriteFile
CreateNamedPipeW
CreateFileW
OpenProcess
HeapReAlloc
HeapAlloc
SubmitIoRing
GetCurrentProcessId
GetProcessHeap
PopIoRingCompletion
BuildIoRingWriteFile
CreateIoRing
KERNEL32.dll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
GetStdHandle
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
HeapSize
WriteConsoleW
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVbad_exception@std@@
.?AVexception@std@@
.?AVtype_info@@
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
api-ms-
(null)
mscoree.dll
api-ms-win-core-datetime-l1-1-1
api-ms-win-core-file-l1-2-4
api-ms-win-core-file-l1-2-2
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
advapi32
kernelbase
api-ms-win-appmodel-runtime-l1-1-2
user32
ext-ms-
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
((((( H
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
CONOUT$
\Device\Afd\Endpoint
\\.\pipe\ioring_in
\\.\pipe\ioring_out
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.Redcap.4!c
Elastic Windows.Exploit.IoRing
ClamAV Clean
CMC Clean
CAT-QuickHeal Trojan.Ghanarava.1733028476b003f2
Skyhigh Artemis!Trojan
ALYac Trojan.GenericKD.65964350
Cylance Unsafe
Zillya Exploit.CVE202321768.Win32.2
Sangfor Exploit.Win64.CVE.Vdul
CrowdStrike win/malicious_confidence_100% (W)
Alibaba Exploit:Application/CVE-2023-21768.a5598091
K7GW Riskware ( 0040eff71 )
K7AntiVirus Riskware ( 0040eff71 )
huorong Exploit/CVE-2023-21768.a
Baidu Clean
VirIT Trojan.Win64.Genus.HHM
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of Win32/Exploit.CVE-2023-21768.A
APEX Malicious
Avast Win64:ExploitX-gen [Expl]
Cynet Malicious (score: 99)
Kaspersky Clean
BitDefender Trojan.GenericKD.65964350
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Trojan.GenericKD.65964350
Tencent Malware.Win32.Gencirc.11bbe91e
Sophos Exp/2321768-A
F-Secure Trojan.TR/Redcap.syvqb
DrWeb Clean
VIPRE Trojan.GenericKD.65964350
TrendMicro TROJ_GEN.R002C0PCN23
Trapmine Clean
CTX exe.trojan.generic
Emsisoft Trojan.GenericKD.65964350 (B)
Ikarus Trojan.SuspectCRC
FireEye Trojan.GenericKD.65964350
Jiangmin HackTool.Convagent.cp
Webroot Clean
Varist W64/ABApplication.NKKF-2365
Avira TR/Redcap.syvqb
Fortinet W64/CVE_2023_21768.A!exploit
Antiy-AVL Trojan[Exploit]/Win32.CVE-2023-21768
Kingsoft Clean
Gridinsoft Clean
Xcitium Malware@#3gc0cfy764mto
Arcabit Trojan.Generic.D3EE893E
SUPERAntiSpyware Clean
ZoneAlarm Exp/2321768-A
Microsoft Trojan:Win64/CVE-2023-21768!MSR
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5583258
Acronis Clean
McAfee Artemis!EFC7C1D297E6
TACHYON Clean
VBA32 Trojan.Win64.CVE_2023_
Malwarebytes Malware.AI.80518804
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002C0PCN23
Rising Exploit.CVE-2023-21768!8.17CE6 (TFE:5:UgNWwTKzlAQ)
Yandex Clean
SentinelOne Clean
MaxSecure Trojan.Malware.204540015.susgen
GData Trojan.GenericKD.65964350
AVG Win64:ExploitX-gen [Expl]
DeepInstinct MALICIOUS
alibabacloud Exploit:Win/CVE-2023-21768.A
No IRMA results available.