Static | ZeroBOX

PE Compile Time

2025-04-08 22:33:10

PE Imphash

56546ba9d904ef5928b0a1c996b679d1

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00009f60 0x0000a000 6.23178904622
.data 0x0000b000 0x00000110 0x00000200 1.18915082195
.rdata 0x0000c000 0x00001950 0x00001a00 5.28289430942
.pdata 0x0000e000 0x0000069c 0x00000800 3.80516220913
.xdata 0x0000f000 0x00000728 0x00000800 4.27815336303
.bss 0x00010000 0x00000c60 0x00000000 0.0
.idata 0x00011000 0x00000f0c 0x00001000 4.22287882769
.CRT 0x00012000 0x00000068 0x00000200 0.332552443246
.tls 0x00013000 0x00000010 0x00000200 0.0
.rsrc 0x00014000 0x000003b0 0x00000400 3.08755623102
.reloc 0x00015000 0x00000098 0x00000200 1.72067817112

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x00014058 0x00000358 LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library ADVAPI32.dll:
0x1400113fc CryptAcquireContextA
0x140011404 CryptGenRandom
0x14001140c CryptReleaseContext
Library IPHLPAPI.DLL:
0x14001141c GetTcpTable
Library KERNEL32.dll:
0x14001142c CloseHandle
0x140011434 CopyFileA
0x14001143c CreateMutexA
0x140011444 CreateThread
0x14001144c DeleteCriticalSection
0x140011454 DeleteFileA
0x14001145c EnterCriticalSection
0x140011464 ExitProcess
0x14001146c GetCurrentProcessId
0x140011474 GetLastError
0x14001147c GetModuleFileNameA
0x140011484 GetModuleHandleW
0x14001148c GetProcAddress
0x140011494 GetStartupInfoA
0x1400114a4 IsDBCSLeadByteEx
0x1400114ac LeaveCriticalSection
0x1400114b4 MoveFileA
0x1400114bc MultiByteToWideChar
0x1400114c4 ReleaseMutex
0x1400114cc SetThreadPriority
0x1400114dc Sleep
0x1400114e4 TlsGetValue
0x1400114ec VirtualProtect
0x1400114f4 VirtualQuery
0x1400114fc WaitForMultipleObjects
0x140011504 WideCharToMultiByte
Library msvcrt.dll:
0x140011514 __C_specific_handler
0x14001151c ___lc_codepage_func
0x140011524 ___mb_cur_max_func
0x14001152c __getmainargs
0x140011534 __initenv
0x14001153c __iob_func
0x140011544 __lconv_init
0x14001154c __set_app_type
0x140011554 __setusermatherr
0x14001155c _acmdln
0x140011564 _amsg_exit
0x14001156c _cexit
0x140011574 _commode
0x14001157c _errno
0x140011584 _exit
0x14001158c _fmode
0x140011594 _initterm
0x14001159c _lock
0x1400115a4 _onexit
0x1400115ac _time64
0x1400115b4 _unlock
0x1400115bc abort
0x1400115c4 atoi
0x1400115cc calloc
0x1400115d4 exit
0x1400115dc fclose
0x1400115e4 fopen
0x1400115ec fprintf
0x1400115f4 fputc
0x1400115fc free
0x140011604 fwrite
0x14001160c localeconv
0x140011614 malloc
0x14001161c memcpy
0x140011624 perror
0x14001162c rand
0x140011634 signal
0x14001163c strcpy
0x140011644 strerror
0x14001164c strlen
0x140011654 strncmp
0x14001165c strrchr
0x140011664 strstr
0x14001166c vfprintf
0x140011674 wcslen
0x14001167c _write
0x140011684 _open
0x14001168c _close
Library SHELL32.dll:
0x14001169c SHGetSpecialFolderPathA
Library WS2_32.dll:
0x1400116ac WSACleanup
0x1400116b4 WSAGetLastError
0x1400116bc WSASetLastError
0x1400116c4 WSASocketA
0x1400116cc WSAStartup
0x1400116d4 __WSAFDIsSet
0x1400116dc bind
0x1400116e4 closesocket
0x1400116ec connect
0x1400116f4 getsockopt
0x1400116fc htonl
0x140011704 htons
0x14001170c inet_addr
0x140011714 ioctlsocket
0x14001171c ntohl
0x140011724 ntohs
0x14001172c recv
0x140011734 select
0x14001173c send
0x140011744 sendto
0x14001174c setsockopt
0x140011754 shutdown
0x14001175c socket

!This program cannot be run in DOS mode.
`.data
.rdata
@.pdata
@.xdata
.idata
.reloc
AUATUWVSH
[^_]A\A]
[^_]A\A]
AUATUWVSH
[^_]A\A]
AWAVAUATUWVSH
[^_]A\A]A^A_
UAWAVAUATWVSH
[^_A\A]A^A_]
AWAVAUATUWVSH
H+D$0H9
[^_]A\A]A^A_
AWAVAUATUWVSH
8[^_]A\A]A^A_
8[^_]A\A]A^A_
AWAVAUATUWVSH
[^_]A\A]A^A_
AWAVAUATUWVSH
[^_]A\A]A^A_
AWAVAUATUWVSH
D$<A9\$
t$XI+1t
h[^_]A\A]A^A_
AWAVAUATUWVSH
H+D$0H9
|$hI+8t
x[^_]A\A]A^A_
AWAVAUATUWVSH
H+D$0L9
|$hI+9t
x[^_]A\A]A^A_
AWAVAUATUWVSH
[^_]A\A]A^A_
AWAVAUATUWVSH
[^_]A\A]A^A_
AWAVAUATUWVSH
[^_]A\A]A^A_
AWAVAUATUWVSH
[^_]A\A]A^A_
AVAUATVSH
P[^A\A]A^
AWAVAUATUWVSH
\$\D9\$h
HcD$LE
[^_]A\A]A^A_
AWAVAUATUWVSH
[^_]A\A]A^A_
AUATWVSH
[^_A\A]
AUATVSH
[^A\A]
AUATWVSH
[^_A\A]
UAVAUATWVSH
ATUWVSH
P[^_]A\
P[^_]A\
UAWAVAUATWVSH
[^_A\A]A^A_]
ATWVSH
([^_A\H
tNHcA<H
tTIcB<L
tCHcA<H
tKIcA<L
tSIcK<L
AUATSH
0[A\A]
C$9C(~
u HcC$A
AVAUATUWVSH
@[^_]A\A]A^
UATWVSH
tmIcD$
[^_A\]
[^_A\]
=UUUUw
UAWAVAUATWVSH
[^_A\A]A^A_]
AUATSH
[A\A]
UAWAVAUATWVSH
[^_A\A]A^A_]
AUATUWVSH
h[^_]A\A]
h[^_]A\A]
AWAVAUATUWVSH
[^_]A\A]A^A_
AWAVAUATUWVSH
8[^_]A\A]A^A_
AWAVAUATUWVSH
[^_]A\A]A^A_
D$(9D$|
HcD$PH
L$|;L$(
+T$TE1
D$D+D$(
ATUWVSHcY
[^_]A\
[^_]A\
AUATVSH
([^A\A]
AWAVAUATUWVSH
([^_]A\A]A^A_
AUATWVSH
[^_A\A]
[^_A\A]
AVAUATUWVSH
[^_]A\A]A^
AUATUWVSH
([^_]A\A]
([^_]A\A]
ATSHcA
AUATWVSH
@[^_A\A]
AVAUATUWVSH
@[^_]A\A]A^
ATWVSH
H[^_A\
AVAUATUWVSH
0[^_]A\A]A^
AUATUWVSH
[^_]A\A]
333333
Starting optimized TCP attack on %s:%d with %d threads for %d seconds
Memory allocation failed
Failed to allocate memory for thread %d
Failed to create thread %d
TCP attack on %s:%d completed
Failed to create thread %d
Port %d is already in use by another process (bind check)
Port %d is already in use by another process (TCP table check)
Received signal %d, preparing for shutdown...
WSAStartup failed with error: %d
Could not find a usable version of Winsock.dll
Winsock initialized successfully
Closing client socket
Winsock cleaned up
Cleaning up resources...
Releasing mutex
Bot shutdown complete, all resources released.
%d.%d.%d.%d
Port %d is already in use. Not launching TCP attack.
Port %d is already in use. Not launching UDP attack.
Port %d is already in use. Not launching PPS attack.
Port %d is already in use. Not launching NUDP attack.
Port %d is already in use. Not launching UDP Payload attack.
Port %d is already in use. Not launching TCP Payload attack.
synack
acksyn
synrst
ackpsh
finack
Invalid socket passed to connect_with_timeout
Failed to set socket to non-blocking mode: %d
Connect failed immediately with error: %d
Connection attempt timed out
Select failed during connect: %d
Connection failed with error: %d
Socket is not writable after select
Failed to set socket back to blocking mode: %d
RtlGetVersion
Windows %lu.%lu (Bot build %.1f)
Unknown (Bot build %.1f)
CBOTX_INSTANCE_MUTEX_1_7
Another bot instance is already running. Exiting...
Another bot is already using port %d. Shutting down...
123.253.61.24
Failed to create socket. Waiting before retry...
Attempting to connect to CNC server at %s:%d
Connection failed. Retrying in 3 seconds...
Connected to C&C server
recv failed
Server closed connection
Received %d bytes:
Heartbeat failed, server unavailable
Select error: %d
Disconnected from server. Retrying in 3 seconds...
Main loop exited, performing cleanup...
File deleted successfully: %s
Error deleting file: %s. Error code: %d
svchost.exe
File %s deleted from Startup.
Error: Failed to delete file %s from Startup. Error code: %d
Error: Could not get Startup folder path.
Old file with the same name deleted successfully.
Error while deleting old file: %d
File renamed successfully to: %s
Error while renaming file: %d
File does not exist in Startup to rename.
File copied to Startup successfully.
Error while copying file: %d
File already exists in Startup.
CONOUT$
*** stack smashing detected ***:
*** buffer overflow detected ***:
terminated
Unknown error
Argument domain error (DOMAIN)
Overflow range error (OVERFLOW)
Partial loss of significance (PLOSS)
Total loss of significance (TLOSS)
The result is too small to be represented (UNDERFLOW)
Argument singularity (SIGN)
_matherr(): %s in %s(%g, %g) (retval=%g)
Mingw-w64 runtime failure:
Address %p has no image-section
VirtualQuery failed for %d bytes at address %p
VirtualProtect failed with code 0x%x
Unknown pseudo relocation protocol version %d.
Unknown pseudo relocation bit size %d.
(null)
Infinity
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 10-win32 20220113
GCC: (GNU) 10-win32 20220113
GCC: (GNU) 10-win32 20220113
GCC: (GNU) 10-win32 20220113
GCC: (GNU) 10-win32 20220113
GCC: (GNU) 10-win32 20220113
GCC: (GNU) 10-win32 20220113
GCC: (GNU) 10-win32 20220113
GCC: (GNU) 10-win32 20220113
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 10-win32 20220113
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 9.3-win32 20200320
GCC: (GNU) 10-win32 20220113
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
GetTcpTable
CloseHandle
CopyFileA
CreateMutexA
CreateThread
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
GetCurrentProcessId
GetLastError
GetModuleFileNameA
GetModuleHandleW
GetProcAddress
GetStartupInfoA
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
MoveFileA
MultiByteToWideChar
ReleaseMutex
SetThreadPriority
SetUnhandledExceptionFilter
TlsGetValue
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WideCharToMultiByte
__C_specific_handler
___lc_codepage_func
___mb_cur_max_func
__getmainargs
__initenv
__iob_func
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_commode
_errno
_fmode
_initterm
_onexit
_time64
_unlock
calloc
fclose
fprintf
fwrite
localeconv
malloc
memcpy
perror
signal
strcpy
strerror
strlen
strncmp
strrchr
strstr
vfprintf
wcslen
_write
_close
SHGetSpecialFolderPathA
WSACleanup
WSAGetLastError
WSASetLastError
WSASocketA
WSAStartup
__WSAFDIsSet
closesocket
connect
getsockopt
inet_addr
ioctlsocket
select
sendto
setsockopt
shutdown
socket
ADVAPI32.dll
IPHLPAPI.DLL
KERNEL32.dll
msvcrt.dll
SHELL32.dll
WS2_32.dll
ntdll.dll
(null)
VS_VERSION_INFO
StringFileInfo
040904B0
CompanyName
Microsoft Corporation
FileDescription
Host Process for Windows Services
FileVersion
1.2.0.0
InternalName
LegalCopyright
Microsoft Corporation. All rights reserved.
OriginalFilename
svchost.exe
ProductName
Microsoft
Windows
Operating System
ProductVersion
1.2.0.0
VarFileInfo
Translation
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.Generic.4!c
Elastic malicious (high confidence)
ClamAV Clean
CMC Clean
CAT-QuickHeal Trojan.Ghanarava.1744459309f35a66
Skyhigh Artemis!Trojan
ALYac Gen:Variant.Barys.431553
Cylance Unsafe
Zillya Clean
Sangfor Trojan.Win64.Agent.Vlxw
CrowdStrike win/malicious_confidence_90% (D)
Alibaba Clean
K7GW Trojan ( 005c58731 )
K7AntiVirus Trojan ( 005c58731 )
huorong Clean
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of Win64/Agent_AGen.DKM
APEX Clean
Avast Win64:MalwareX-gen [Misc]
Cynet Malicious (score: 99)
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Gen:Variant.Barys.431553
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.Barys.431553
Tencent Win64.Trojan.Generic.Gwnw
Sophos Generic Reputation PUA (PUA)
F-Secure Trojan.TR/AVI.Agent.xvgra
DrWeb Clean
VIPRE Gen:Variant.Barys.431553
TrendMicro Clean
McAfeeD ti!EFE81402806E
Trapmine Clean
CTX exe.trojan.barys
Emsisoft Gen:Variant.Barys.431553 (B)
Ikarus Trojan.Win64.Agent
GData Gen:Variant.Barys.431553
Jiangmin Clean
Webroot Clean
Varist W64/ABTrojan.FIGG-6150
Avira TR/AVI.Agent.xvgra
Antiy-AVL Trojan[Ransom]/MSIL.HiddenTear
Kingsoft Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Barys.D695C1
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Ransom:MSIL/HiddenTear!rfn
Google Detected
AhnLab-V3 Trojan/Win.Generic.R700125
Acronis Clean
McAfee Artemis!E985D78DA4B4
TACHYON Clean
VBA32 Clean
Malwarebytes Trojan.Dropper
Panda Trj/Agent.RP
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002H09DB25
Rising Trojan.Generic!8.C3 (CLOUD)
Yandex Clean
SentinelOne Clean
MaxSecure Clean
Fortinet W32/PossibleThreat
AVG Win64:MalwareX-gen [Misc]
DeepInstinct MALICIOUS
alibabacloud Trojan:Win/Barys.Gen
No IRMA results available.