Static | ZeroBOX

PE Compile Time

2021-08-10 09:01:05

PE Imphash

c38ebbf4627ca2303746c77210e5a12e

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00000d22 0x00000e00 5.64031713096
.rdata 0x00002000 0x00000825 0x00000a00 3.88559276679
.data 0x00003000 0x000008c0 0x00000400 5.8113338022
.pdata 0x00004000 0x000000fc 0x00000200 2.0308151415
.rsrc 0x00005000 0x00000440 0x00000600 2.5556377265
.reloc 0x00006000 0x00000064 0x00000200 0.153703185652

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x00005060 0x000003dc LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library ADVAPI32.dll:
0x180002000 CreateProcessAsUserW
0x180002008 SetTokenInformation
0x180002010 DuplicateTokenEx
0x180002018 OpenProcessToken
Library USERENV.dll:
0x1800020a8 DestroyEnvironmentBlock
0x1800020b0 CreateEnvironmentBlock
Library WINSTA.dll:
0x1800020c0 WinStationEnumerateW
0x1800020c8 WinStationFreeMemory
Library KERNEL32.dll:
0x180002028 GetCurrentProcessId
0x180002030 GetCurrentThreadId
0x180002038 GetTickCount
0x180002040 QueryPerformanceCounter
0x180002050 UnhandledExceptionFilter
0x180002058 Sleep
0x180002060 GetCurrentProcess
0x180002068 SetLastError
0x180002070 CloseHandle
0x180002078 TerminateProcess
0x180002080 RtlCaptureContext
0x180002088 RtlLookupFunctionEntry
0x180002090 RtlVirtualUnwind
0x180002098 GetSystemTimeAsFileTime
Library msvcrt.dll:
0x1800020d8 memset
0x1800020e0 __C_specific_handler
0x1800020e8 _XcptFilter
0x1800020f0 malloc
0x1800020f8 free
0x180002100 _amsg_exit
0x180002108 _initterm

Exports

Ordinal Address Name
1 0x180001020 DrvDisableDriver
2 0x180001064 DrvEnableDriver
3 0x180001024 DrvQueryDriverInfo
4 0x180001020 DrvResetConfigCache
5 0x1800010a0 GenerateCopyFilePaths
6 0x1800010a4 SpoolerCopyFileEvent
!This program cannot be run in DOS mode.
`.rdata
@.data
.pdata
@.rsrc
@.reloc
VWATAUAVH
A^A]A\_^
LcA<E3
EP=csm
Ep=csm
E`=csm
E(=csm
E@=csm
EX=csm
Ex=csm
```hhh
xppwpp
OpenProcessToken
CreateProcessAsUserW
SetTokenInformation
DuplicateTokenEx
ADVAPI32.dll
CreateEnvironmentBlock
DestroyEnvironmentBlock
USERENV.dll
WinStationEnumerateW
WinStationFreeMemory
WINSTA.dll
GetCurrentProcess
SetLastError
CloseHandle
KERNEL32.dll
msvcrt.dll
memset
__C_specific_handler
_XcptFilter
malloc
_initterm
_amsg_exit
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
mimispool.dll
DrvDisableDriver
DrvEnableDriver
DrvQueryDriverInfo
DrvResetConfigCache
GenerateCopyFilePaths
SpoolerCopyFileEvent
Greater Manchester1
Salford1
Comodo CA Limited1!0
AAA Certificate Services0
210525000000Z
281231235959Z0V1
Sectigo Limited1-0+
$Sectigo Public Code Signing Root R460
H/(@Bp 6
2http://crl.comodoca.com/AAACertificateServices.crl04
http://ocsp.comodoca.com0
Sectigo Limited1-0+
$Sectigo Public Code Signing Root R460
210322000000Z
360321235959Z0T1
Sectigo Limited1+0)
"Sectigo Public Code Signing CA R360
FFlCx@
H/(@Bp 6
:http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0{
:http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
http://ocsp.sectigo.com0
ts7!:o
n0PPd}
Sectigo Limited1+0)
"Sectigo Public Code Signing CA R360
240604000000Z
250604235959Z0b1
Illinois10
McDonald's Corporation10
McDonald's Corporation0
D@\[2{
a1{0zYZ
https://sectigo.com/CPS0
8http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
8http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
http://ocsp.sectigo.com0
\mmYL3
Sectigo Limited1+0)
"Sectigo Public Code Signing CA R36
$>T51v
|1g3\P
9{y=&aIa
H(%|a
20250407023529Z
Manchester1
Sectigo Limited100.
'Sectigo Public Time Stamping Signer R35
Sectigo Limited1,0*
#Sectigo Public Time Stamping CA R360
240115000000Z
350414235959Z0n1
Manchester1
Sectigo Limited100.
'Sectigo Public Time Stamping Signer R350
x2<C>4C
https://sectigo.com/CPS0
9http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
9http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
http://ocsp.sectigo.com0
%2Ka~
Sectigo Limited1.0,
%Sectigo Public Time Stamping Root R460
210322000000Z
360321235959Z0U1
Sectigo Limited1,0*
#Sectigo Public Time Stamping CA R360
;http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0|
;http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
http://ocsp.sectigo.com0
%59)$J+
G{JVHa
New Jersey1
Jersey City1
The USERTRUST Network1.0,
%USERTrust RSA Certification Authority0
210322000000Z
380118235959Z0W1
Sectigo Limited1.0,
%Sectigo Public Time Stamping Root R460
8hm)(od
?http://crl.usertrust.com/USERTrustRSACertificationAuthority.crl05
http://ocsp.usertrust.com0
avI&Q_
.TPfo:
Sectigo Limited1,0*
#Sectigo Public Time Stamping CA R36
250407023529Z0?
Sectigo Limited1.0,
%Sectigo Public Time Stamping Root R46
New Jersey1
Jersey City1
The USERTRUST Network1.0,
%USERTrust RSA Certification Authority
cmd.exe
winsta0\default
VS_VERSION_INFO
StringFileInfo
040904b0
ProductName
mimispool (mimikatz)
ProductVersion
2.2.0.0
CompanyName
gentilkiwi (Benjamin DELPY)
FileDescription
mimispool for Windows (mimikatz)
FileVersion
0.3.0.0
InternalName
mimispool
LegalCopyright
Copyright (c) 2007 - 2021 gentilkiwi (Benjamin DELPY)
OriginalFilename
mimispool.dll
PrivateBuild
Build with love for POC only
SpecialBuild
VarFileInfo
Translation
Antivirus Signature
Bkav Clean
Lionic Clean
Elastic malicious (high confidence)
ClamAV Clean
CMC Clean
CAT-QuickHeal HackTool.Mimikatz.S33893082
Skyhigh Trojan-FWXX!5737EF577C12
ALYac Gen:Variant.Mimikatz.10
Cylance Clean
Zillya Trojan.Mimikatz.Win64.482
Sangfor Clean
CrowdStrike Clean
Alibaba Clean
K7GW Clean
K7AntiVirus Clean
huorong HackTool/Mimikatz.e
Baidu Clean
VirIT Trojan.Win32.Mimi.DQYA
Paloalto Clean
Symantec Hacktool.Mimikatz
tehtris Clean
ESET-NOD32 a variant of Win32/RiskWare.Mimikatz.BO
APEX Clean
Avast Win32:CVE-2021-1675-G [Expl]
Cynet Clean
Kaspersky HEUR:Trojan-PSW.Win64.Mimikatz.gen
BitDefender Gen:Variant.Mimikatz.10
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.Mimikatz.10
Tencent Trojan.Win64.Mimikatz.a
Sophos ATK/Mimikatz-CR
F-Secure Clean
DrWeb Tool.Mimikatz.1199
VIPRE Gen:Variant.Mimikatz.10
TrendMicro HKTL_MIMIKATZ64
McAfeeD ti!F20E0114C803
Trapmine Clean
CTX dll.unknown.mimikatz
Emsisoft Gen:Variant.Mimikatz.10 (B)
Ikarus Trojan.PSW.Mimikatz
GData Gen:Variant.Mimikatz.10
Jiangmin Trojan.PSW.Mimikatz.cyl
Webroot W32.Hacktool.Gen
Varist W64/Mimikatz.L
Avira Clean
Antiy-AVL Trojan[PSW]/Win64.Mimikatz
Kingsoft Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Mimikatz.10
SUPERAntiSpyware Clean
ZoneAlarm ATK/Mimikatz-CR
Microsoft Program:Win32/Wacapew.C!ml
Google Detected
AhnLab-V3 Trojan/Win.Mimikatz.R445129
Acronis Clean
McAfee Trojan-FWXX!5737EF577C12
TACHYON Clean
VBA32 Clean
Malwarebytes Mimikatz.Spyware.Stealer.DDS
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall HKTL_MIMIKATZ64
Rising Trojan.Agent!8.B1E (TFE:6:Z7hKCBfrpcB)
Yandex RiskWare.Mimikatz!eQ4ZXKbwWQE
SentinelOne Clean
MaxSecure Clean
Fortinet Clean
AVG Win32:CVE-2021-1675-G [Expl]
DeepInstinct Clean
alibabacloud Clean
No IRMA results available.