Overview
overview
10Static
static
3weird viru...09.bat
windows7-x64
7weird viru...09.bat
windows10-2004-x64
10weird viru...at.exe
windows7-x64
weird viru...at.exe
windows10-2004-x64
1weird viru...09.vbs
windows7-x64
3weird viru...09.vbs
windows10-2004-x64
3weird viru...25.bat
windows7-x64
7weird viru...25.bat
windows10-2004-x64
10weird viru...at.exe
windows7-x64
weird viru...at.exe
windows10-2004-x64
1weird viru...25.vbs
windows7-x64
3weird viru...25.vbs
windows10-2004-x64
3weird viru...40.bat
windows7-x64
7weird viru...40.bat
windows10-2004-x64
10weird viru...at.exe
windows7-x64
weird viru...at.exe
windows10-2004-x64
1weird viru...40.vbs
windows7-x64
3weird viru...40.vbs
windows10-2004-x64
3weird viru...66.bat
windows7-x64
7weird viru...66.bat
windows10-2004-x64
10weird viru...at.exe
windows7-x64
weird viru...at.exe
windows10-2004-x64
1weird viru...66.vbs
windows7-x64
3weird viru...66.vbs
windows10-2004-x64
3weird viru...18.bat
windows7-x64
7weird viru...18.bat
windows10-2004-x64
10weird viru...at.exe
windows7-x64
weird viru...at.exe
windows10-2004-x64
1weird viru...18.vbs
windows7-x64
3weird viru...18.vbs
windows10-2004-x64
3weird viru...93.bat
windows7-x64
7weird viru...93.bat
windows10-2004-x64
10Static task
static1
Behavioral task
behavioral1
Sample
weird virus oder so/startup_str_109.bat
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
weird virus oder so/startup_str_109.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
weird virus oder so/startup_str_109.bat.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
weird virus oder so/startup_str_109.bat.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
weird virus oder so/startup_str_109.vbs
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
weird virus oder so/startup_str_109.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
weird virus oder so/startup_str_125.bat
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
weird virus oder so/startup_str_125.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
weird virus oder so/startup_str_125.bat.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
weird virus oder so/startup_str_125.bat.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
weird virus oder so/startup_str_125.vbs
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
weird virus oder so/startup_str_125.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
weird virus oder so/startup_str_140.bat
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
weird virus oder so/startup_str_140.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
weird virus oder so/startup_str_140.bat.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
weird virus oder so/startup_str_140.bat.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
weird virus oder so/startup_str_140.vbs
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
weird virus oder so/startup_str_140.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
weird virus oder so/startup_str_166.bat
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
weird virus oder so/startup_str_166.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
weird virus oder so/startup_str_166.bat.exe
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
weird virus oder so/startup_str_166.bat.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
weird virus oder so/startup_str_166.vbs
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
weird virus oder so/startup_str_166.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
weird virus oder so/startup_str_18.bat
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
weird virus oder so/startup_str_18.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
weird virus oder so/startup_str_18.bat.exe
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
weird virus oder so/startup_str_18.bat.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
weird virus oder so/startup_str_18.vbs
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
weird virus oder so/startup_str_18.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
weird virus oder so/startup_str_193.bat
Resource
win7-20230831-en
General
-
Target
c47ae92860ad12f5e2a08996d63374bc.bin
-
Size
24.6MB
-
MD5
c47ae92860ad12f5e2a08996d63374bc
-
SHA1
cd92f5d59cfe406d94a8261814cf943eba8a2a35
-
SHA256
4005c05ee1c6ba6914b78686789633dc24fe05f8ee844daebfd7b9cb08869726
-
SHA512
d8236b8b9a5c33c8b16968d48c0016d69dbd2b1aa376d4d335463b15af30c323e2ba7880231d9cde6468b8454e1cd9d044cc64151b9b0abd1b825de47875453a
-
SSDEEP
786432:73M3j3K3S3k3t3+343h3r3H383e3X3I3V3s3J3Q373w3k3w3U3p3L3/3W343j3x0:Z
Malware Config
Signatures
-
Unsigned PE 72 IoCs
Checks for missing Authenticode signature.
resource unpack001/weird virus oder so/startup_str_109.bat.exe unpack001/weird virus oder so/startup_str_125.bat.exe unpack001/weird virus oder so/startup_str_140.bat.exe unpack001/weird virus oder so/startup_str_166.bat.exe unpack001/weird virus oder so/startup_str_18.bat.exe unpack001/weird virus oder so/startup_str_193.bat.exe unpack001/weird virus oder so/startup_str_199.bat.exe unpack001/weird virus oder so/startup_str_2.bat.exe unpack001/weird virus oder so/startup_str_211.bat.exe unpack001/weird virus oder so/startup_str_232.bat.exe unpack001/weird virus oder so/startup_str_241.bat.exe unpack001/weird virus oder so/startup_str_253.bat.exe unpack001/weird virus oder so/startup_str_266.bat.exe unpack001/weird virus oder so/startup_str_270.bat.exe unpack001/weird virus oder so/startup_str_296.bat.exe unpack001/weird virus oder so/startup_str_3.bat.exe unpack001/weird virus oder so/startup_str_311.bat.exe unpack001/weird virus oder so/startup_str_333.bat.exe unpack001/weird virus oder so/startup_str_348.bat.exe unpack001/weird virus oder so/startup_str_368.bat.exe unpack001/weird virus oder so/startup_str_369.bat.exe unpack001/weird virus oder so/startup_str_37.bat.exe unpack001/weird virus oder so/startup_str_373.bat.exe unpack001/weird virus oder so/startup_str_381.bat.exe unpack001/weird virus oder so/startup_str_394.bat.exe unpack001/weird virus oder so/startup_str_397.bat.exe unpack001/weird virus oder so/startup_str_428.bat.exe unpack001/weird virus oder so/startup_str_442.bat.exe unpack001/weird virus oder so/startup_str_472.bat.exe unpack001/weird virus oder so/startup_str_480.bat.exe unpack001/weird virus oder so/startup_str_496.bat.exe unpack001/weird virus oder so/startup_str_513.bat.exe unpack001/weird virus oder so/startup_str_523.bat.exe unpack001/weird virus oder so/startup_str_528.bat.exe unpack001/weird virus oder so/startup_str_555.bat.exe unpack001/weird virus oder so/startup_str_563.bat.exe unpack001/weird virus oder so/startup_str_568.bat.exe unpack001/weird virus oder so/startup_str_584.bat.exe unpack001/weird virus oder so/startup_str_604.bat.exe unpack001/weird virus oder so/startup_str_621.bat.exe unpack001/weird virus oder so/startup_str_629.bat.exe unpack001/weird virus oder so/startup_str_711.bat.exe unpack001/weird virus oder so/startup_str_731.bat.exe unpack001/weird virus oder so/startup_str_733.bat.exe unpack001/weird virus oder so/startup_str_751.bat.exe unpack001/weird virus oder so/startup_str_765.bat.exe unpack001/weird virus oder so/startup_str_776.bat.exe unpack001/weird virus oder so/startup_str_78.bat.exe unpack001/weird virus oder so/startup_str_781.bat.exe unpack001/weird virus oder so/startup_str_788.bat.exe unpack001/weird virus oder so/startup_str_790.bat.exe unpack001/weird virus oder so/startup_str_792.bat.exe unpack001/weird virus oder so/startup_str_795.bat.exe unpack001/weird virus oder so/startup_str_825.bat.exe unpack001/weird virus oder so/startup_str_834.bat.exe unpack001/weird virus oder so/startup_str_837.bat.exe unpack001/weird virus oder so/startup_str_853.bat.exe unpack001/weird virus oder so/startup_str_854.bat.exe unpack001/weird virus oder so/startup_str_866.bat.exe unpack001/weird virus oder so/startup_str_87.bat.exe unpack001/weird virus oder so/startup_str_885.bat.exe unpack001/weird virus oder so/startup_str_887.bat.exe unpack001/weird virus oder so/startup_str_91.bat.exe unpack001/weird virus oder so/startup_str_911.bat.exe unpack001/weird virus oder so/startup_str_913.bat.exe unpack001/weird virus oder so/startup_str_915.bat.exe unpack001/weird virus oder so/startup_str_95.bat.exe unpack001/weird virus oder so/startup_str_950.bat.exe unpack001/weird virus oder so/startup_str_961.bat.exe unpack001/weird virus oder so/startup_str_970.bat.exe unpack001/weird virus oder so/startup_str_98.bat.exe unpack001/weird virus oder so/startup_str_994.bat.exe
Files
-
c47ae92860ad12f5e2a08996d63374bc.bin.zip
-
weird virus oder so/startup_str_109.bat
-
weird virus oder so/startup_str_109.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_109.vbs.vbs
-
weird virus oder so/startup_str_125.bat
-
weird virus oder so/startup_str_125.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_125.vbs.vbs
-
weird virus oder so/startup_str_140.bat
-
weird virus oder so/startup_str_140.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_140.vbs.vbs
-
weird virus oder so/startup_str_166.bat
-
weird virus oder so/startup_str_166.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_166.vbs.vbs
-
weird virus oder so/startup_str_18.bat
-
weird virus oder so/startup_str_18.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_18.vbs.vbs
-
weird virus oder so/startup_str_193.bat
-
weird virus oder so/startup_str_193.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_193.vbs.vbs
-
weird virus oder so/startup_str_199.bat
-
weird virus oder so/startup_str_199.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_199.vbs.vbs
-
weird virus oder so/startup_str_2.bat
-
weird virus oder so/startup_str_2.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_2.vbs.vbs
-
weird virus oder so/startup_str_211.bat
-
weird virus oder so/startup_str_211.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_211.vbs.vbs
-
weird virus oder so/startup_str_232.bat
-
weird virus oder so/startup_str_232.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_232.vbs.vbs
-
weird virus oder so/startup_str_241.bat
-
weird virus oder so/startup_str_241.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_241.vbs.vbs
-
weird virus oder so/startup_str_253.bat
-
weird virus oder so/startup_str_253.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_253.vbs.vbs
-
weird virus oder so/startup_str_266.bat
-
weird virus oder so/startup_str_266.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_266.vbs.vbs
-
weird virus oder so/startup_str_270.bat
-
weird virus oder so/startup_str_270.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_270.vbs.vbs
-
weird virus oder so/startup_str_296.bat
-
weird virus oder so/startup_str_296.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_296.vbs.vbs
-
weird virus oder so/startup_str_3.bat
-
weird virus oder so/startup_str_3.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_3.vbs.vbs
-
weird virus oder so/startup_str_311.bat
-
weird virus oder so/startup_str_311.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_311.vbs.vbs
-
weird virus oder so/startup_str_333.bat
-
weird virus oder so/startup_str_333.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_333.vbs.vbs
-
weird virus oder so/startup_str_348.bat
-
weird virus oder so/startup_str_348.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_348.vbs.vbs
-
weird virus oder so/startup_str_368.bat
-
weird virus oder so/startup_str_368.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_368.vbs.vbs
-
weird virus oder so/startup_str_369.bat
-
weird virus oder so/startup_str_369.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_369.vbs.vbs
-
weird virus oder so/startup_str_37.bat
-
weird virus oder so/startup_str_37.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_37.vbs.vbs
-
weird virus oder so/startup_str_373.bat
-
weird virus oder so/startup_str_373.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_373.vbs.vbs
-
weird virus oder so/startup_str_381.bat
-
weird virus oder so/startup_str_381.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_381.vbs.vbs
-
weird virus oder so/startup_str_394.bat
-
weird virus oder so/startup_str_394.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_394.vbs.vbs
-
weird virus oder so/startup_str_397.bat
-
weird virus oder so/startup_str_397.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_397.vbs.vbs
-
weird virus oder so/startup_str_428.bat
-
weird virus oder so/startup_str_428.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_428.vbs.vbs
-
weird virus oder so/startup_str_442.bat
-
weird virus oder so/startup_str_442.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_442.vbs.vbs
-
weird virus oder so/startup_str_472.bat
-
weird virus oder so/startup_str_472.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_472.vbs.vbs
-
weird virus oder so/startup_str_480.bat
-
weird virus oder so/startup_str_480.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_480.vbs.vbs
-
weird virus oder so/startup_str_496.bat
-
weird virus oder so/startup_str_496.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_496.vbs.vbs
-
weird virus oder so/startup_str_513.bat
-
weird virus oder so/startup_str_513.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_513.vbs.vbs
-
weird virus oder so/startup_str_523.bat
-
weird virus oder so/startup_str_523.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_523.vbs.vbs
-
weird virus oder so/startup_str_528.bat
-
weird virus oder so/startup_str_528.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_528.vbs.vbs
-
weird virus oder so/startup_str_555.bat
-
weird virus oder so/startup_str_555.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_555.vbs.vbs
-
weird virus oder so/startup_str_563.bat
-
weird virus oder so/startup_str_563.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_563.vbs.vbs
-
weird virus oder so/startup_str_568.bat
-
weird virus oder so/startup_str_568.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_568.vbs.vbs
-
weird virus oder so/startup_str_584.bat
-
weird virus oder so/startup_str_584.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_584.vbs.vbs
-
weird virus oder so/startup_str_604.bat
-
weird virus oder so/startup_str_604.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_604.vbs.vbs
-
weird virus oder so/startup_str_621.bat
-
weird virus oder so/startup_str_621.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_621.vbs.vbs
-
weird virus oder so/startup_str_629.bat
-
weird virus oder so/startup_str_629.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_629.vbs.vbs
-
weird virus oder so/startup_str_711.bat
-
weird virus oder so/startup_str_711.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_711.vbs.vbs
-
weird virus oder so/startup_str_731.bat
-
weird virus oder so/startup_str_731.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_731.vbs.vbs
-
weird virus oder so/startup_str_733.bat
-
weird virus oder so/startup_str_733.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_733.vbs.vbs
-
weird virus oder so/startup_str_751.bat
-
weird virus oder so/startup_str_751.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_751.vbs.vbs
-
weird virus oder so/startup_str_765.bat
-
weird virus oder so/startup_str_765.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_765.vbs.vbs
-
weird virus oder so/startup_str_776.bat
-
weird virus oder so/startup_str_776.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_776.vbs.vbs
-
weird virus oder so/startup_str_78.bat
-
weird virus oder so/startup_str_78.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_78.vbs.vbs
-
weird virus oder so/startup_str_781.bat
-
weird virus oder so/startup_str_781.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_781.vbs.vbs
-
weird virus oder so/startup_str_788.bat
-
weird virus oder so/startup_str_788.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_788.vbs.vbs
-
weird virus oder so/startup_str_790.bat
-
weird virus oder so/startup_str_790.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_790.vbs.vbs
-
weird virus oder so/startup_str_792.bat
-
weird virus oder so/startup_str_792.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_792.vbs.vbs
-
weird virus oder so/startup_str_795.bat
-
weird virus oder so/startup_str_795.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_795.vbs.vbs
-
weird virus oder so/startup_str_825.bat
-
weird virus oder so/startup_str_825.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_825.vbs.vbs
-
weird virus oder so/startup_str_834.bat
-
weird virus oder so/startup_str_834.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_834.vbs.vbs
-
weird virus oder so/startup_str_837.bat
-
weird virus oder so/startup_str_837.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_837.vbs.vbs
-
weird virus oder so/startup_str_853.bat
-
weird virus oder so/startup_str_853.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_853.vbs.vbs
-
weird virus oder so/startup_str_854.bat
-
weird virus oder so/startup_str_854.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_854.vbs.vbs
-
weird virus oder so/startup_str_866.bat
-
weird virus oder so/startup_str_866.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_866.vbs.vbs
-
weird virus oder so/startup_str_87.bat
-
weird virus oder so/startup_str_87.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_87.vbs.vbs
-
weird virus oder so/startup_str_885.bat
-
weird virus oder so/startup_str_885.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_885.vbs.vbs
-
weird virus oder so/startup_str_887.bat
-
weird virus oder so/startup_str_887.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_887.vbs.vbs
-
weird virus oder so/startup_str_91.bat
-
weird virus oder so/startup_str_91.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_91.vbs.vbs
-
weird virus oder so/startup_str_911.bat
-
weird virus oder so/startup_str_911.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_911.vbs.vbs
-
weird virus oder so/startup_str_913.bat
-
weird virus oder so/startup_str_913.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_913.vbs.vbs
-
weird virus oder so/startup_str_915.bat
-
weird virus oder so/startup_str_915.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_915.vbs.vbs
-
weird virus oder so/startup_str_95.bat
-
weird virus oder so/startup_str_95.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_95.vbs.vbs
-
weird virus oder so/startup_str_950.bat
-
weird virus oder so/startup_str_950.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_950.vbs.vbs
-
weird virus oder so/startup_str_961.bat
-
weird virus oder so/startup_str_961.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_961.vbs.vbs
-
weird virus oder so/startup_str_970.bat
-
weird virus oder so/startup_str_970.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_970.vbs.vbs
-
weird virus oder so/startup_str_98.bat
-
weird virus oder so/startup_str_98.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_98.vbs.vbs
-
weird virus oder so/startup_str_994.bat
-
weird virus oder so/startup_str_994.bat.exe.exe windows:10 windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
weird virus oder so/startup_str_994.vbs.vbs