C:\Users\idk\Downloads\SHOTHIRIUM\SHOTHIRIUM\compile\SHOTHIRIUM.pdb
Overview
overview
8Static
static
3Aparat32.exe
windows7-x64
1KRITENESIA...AS.exe
windows7-x64
6MEMZ-5.0-b...bin.py
windows7-x64
3MEMZ-5.0-b...bin.py
windows7-x64
3MEMZ-5.0-b...ata.py
windows7-x64
3MEMZ-5.0-b...bat.py
windows7-x64
3MEMZ-Destructive.exe
windows7-x64
6PhantasmA.exe
windows7-x64
3Purgatorium.exe
windows7-x64
Solaris-A65BA.exe
windows7-x64
3Static task
static1
Behavioral task
behavioral1
Sample
Aparat32.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
KRITENESIAS-gdi-trojan-virus/KRITENESIAS-gdi-trojan-virus/KRITENESIAS.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
MEMZ-5.0-beta/NyanMBR/Data/Image/png2bin.py
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
MEMZ-5.0-beta/NyanMBR/Data/Song/midi2bin.py
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
MEMZ-5.0-beta/WindowsTrojan/Data/genData.py
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
MEMZ-5.0-beta/WindowsTrojan/Source/exe2bat.py
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
MEMZ-Destructive.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
PhantasmA.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
Purgatorium.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Solaris-A65BA.exe
Resource
win7-20240729-en
General
-
Target
Leaked_Malware_Stuff.7z
-
Size
1.3MB
-
MD5
cc04b99dee2ca671013498e4a73d34e0
-
SHA1
43d80e0c65f3c0d8e7099fec210bad8d6b40e2af
-
SHA256
9de7d9199cd3dca93a870ef2a688f3070bc360d8901fe0a71d26cdbd2d090dab
-
SHA512
51e968cb6c1a715948ef46f834f9f6d27ceabf130be8b550fedb271ff7d84d1e6562b495820840b4765ccee09d08300d78add0e26175164f62bafeeb394c3650
-
SSDEEP
24576:6D7qPBY/5ueLIDsw91YbIJunOwmnWZxMl0KU9KAhfLS0uCFWW5zFHTdl9:6PqZY/4jsw91zwmnMxMl0B9KAhfICFWk
Malware Config
Signatures
-
Unsigned PE 6 IoCs
Checks for missing Authenticode signature.
resource unpack001/Aparat32.exe unpack001/KRITENESIAS-gdi-trojan-virus/KRITENESIAS-gdi-trojan-virus/KRITENESIAS.exe unpack001/MEMZ-Destructive.exe.vir unpack001/PhantasmA.exe unpack001/Purgatorium.exe.vir unpack001/Solaris-A65BA.exe
Files
-
Leaked_Malware_Stuff.7z.7z
Password: infected
-
1200.bin.png
-
Aparat32.exe.exe windows:4 windows x64 arch:x64
0034e4ca75dec765cb4749fa2a5a6fd2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
DeleteDC
DeleteObject
SelectObject
kernel32
CloseHandle
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
InitializeCriticalSection
LeaveCriticalSection
QueryPerformanceCounter
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__C_specific_handler
__dllonexit
__getmainargs
__initenv
__iob_func
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_errno
_fmode
_initterm
_lock
_onexit
_unlock
abort
calloc
exit
fprintf
free
fwrite
malloc
memcpy
signal
strlen
strncmp
vfprintf
user32
GetDC
GetSystemMetrics
InvalidateRect
MessageBoxW
ReleaseDC
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 198KB - Virtual size: 197KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/4 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/19 Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/31 Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/45 Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/57 Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/70 Size: 1024B - Virtual size: 845B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/81 Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/92 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
DUMP.bin
-
KRITENESIAS-gdi-trojan-virus/KRITENESIAS-gdi-trojan-virus/KRITENESIAS.exe.exe windows:6 windows x86 arch:x86
5f3f244e263ccb2f29dbe2d3ca3219ef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemTimeAsFileTime
GetCurrentThreadId
InitializeSListHead
QueryPerformanceCounter
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
GetConsoleWindow
TerminateThread
CreateThread
Sleep
CloseHandle
WriteFile
GetCurrentProcessId
CreateFileW
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetModuleHandleW
user32
GetWindowRect
MessageBoxW
GetDesktopWindow
GetDC
ShowWindow
GetSystemMetrics
gdi32
StretchBlt
SelectObject
PatBlt
PlgBlt
DeleteObject
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
winmm
waveOutPrepareHeader
waveOutWrite
waveOutOpen
waveOutUnprepareHeader
waveOutClose
vcruntime140
__current_exception_context
__std_type_info_destroy_list
_except_handler4_common
__current_exception
memset
api-ms-win-crt-utility-l1-1-0
rand
api-ms-win-crt-runtime-l1-1-0
_initterm_e
_cexit
_configure_narrow_argv
_seh_filter_dll
_initialize_onexit_table
__p___argv
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
_controlfp_s
terminate
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_register_thread_local_exe_atexit_callback
__p___argc
exit
_register_onexit_function
_set_app_type
_seh_filter_exe
_exit
system
_c_exit
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-math-l1-1-0
_libm_sse2_sin_precise
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
KRITENESIAS-gdi-trojan-virus/KRITENESIAS-gdi-trojan-virus/README.md
-
LEAKS.txt
-
MEMZ-5.0-beta-final-9f09ca4-SOURCE.zip.zip
-
MEMZ-5.0-beta/.gitignore
-
MEMZ-5.0-beta/NyanMBR/Data/Image/Frames/00.png.png
-
MEMZ-5.0-beta/NyanMBR/Data/Image/Frames/01.png.png
-
MEMZ-5.0-beta/NyanMBR/Data/Image/Frames/02.png.png
-
MEMZ-5.0-beta/NyanMBR/Data/Image/Frames/03.png.png
-
MEMZ-5.0-beta/NyanMBR/Data/Image/Frames/04.png.png
-
MEMZ-5.0-beta/NyanMBR/Data/Image/Frames/05.png.png
-
MEMZ-5.0-beta/NyanMBR/Data/Image/Frames/06.png.png
-
MEMZ-5.0-beta/NyanMBR/Data/Image/Frames/07.png.png
-
MEMZ-5.0-beta/NyanMBR/Data/Image/Frames/08.png.png
-
MEMZ-5.0-beta/NyanMBR/Data/Image/Frames/09.png.png
-
MEMZ-5.0-beta/NyanMBR/Data/Image/Frames/10.png.png
-
MEMZ-5.0-beta/NyanMBR/Data/Image/Frames/11.png.png
-
MEMZ-5.0-beta/NyanMBR/Data/Image/Special/01.png.png
-
MEMZ-5.0-beta/NyanMBR/Data/Image/png2bin.py
-
MEMZ-5.0-beta/NyanMBR/Data/Song/README.md
-
MEMZ-5.0-beta/NyanMBR/Data/Song/midi2bin.py
-
MEMZ-5.0-beta/NyanMBR/Makefile
-
MEMZ-5.0-beta/NyanMBR/Source/Compressor/compress.c
-
MEMZ-5.0-beta/NyanMBR/Source/Stage1/decompress.asm
-
MEMZ-5.0-beta/NyanMBR/Source/Stage1/main.asm
-
MEMZ-5.0-beta/NyanMBR/Source/Stage2/Animation/Image/drawIntroFrame.asm
-
MEMZ-5.0-beta/NyanMBR/Source/Stage2/Animation/Image/drawNormalFrame.asm
-
MEMZ-5.0-beta/NyanMBR/Source/Stage2/Animation/Image/initDrawing.asm
-
MEMZ-5.0-beta/NyanMBR/Source/Stage2/Animation/countNyan.asm
-
MEMZ-5.0-beta/NyanMBR/Source/Stage2/Animation/displayFrame.asm
-
MEMZ-5.0-beta/NyanMBR/Source/Stage2/Animation/playNote.asm
-
MEMZ-5.0-beta/NyanMBR/Source/Stage2/Interrupts/keyboardHandler.asm
-
MEMZ-5.0-beta/NyanMBR/Source/Stage2/Interrupts/timerHandler.asm
-
MEMZ-5.0-beta/NyanMBR/Source/Stage2/Setup/setup.asm
-
MEMZ-5.0-beta/NyanMBR/Source/Stage2/Setup/setupInterrupts.asm
-
MEMZ-5.0-beta/NyanMBR/Source/Stage2/Setup/setupSpeaker.asm
-
MEMZ-5.0-beta/NyanMBR/Source/Stage2/Setup/setupTimer.asm
-
MEMZ-5.0-beta/NyanMBR/Source/Stage2/Utils/macros.asm
-
MEMZ-5.0-beta/NyanMBR/Source/Stage2/Utils/timer.asm
-
MEMZ-5.0-beta/NyanMBR/Source/Stage2/main.asm
-
MEMZ-5.0-beta/README.md
-
MEMZ-5.0-beta/WindowsTrojan/Data/KillMessages.txt
-
MEMZ-5.0-beta/WindowsTrojan/Data/Note.txt
-
MEMZ-5.0-beta/WindowsTrojan/Data/Sites.txt
-
MEMZ-5.0-beta/WindowsTrojan/Data/genData.py
-
MEMZ-5.0-beta/WindowsTrojan/Makefile
-
MEMZ-5.0-beta/WindowsTrojan/Source/Clean/Clean.h
-
MEMZ-5.0-beta/WindowsTrojan/Source/Clean/Main.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Destructive/Destructive.h
-
MEMZ-5.0-beta/WindowsTrojan/Source/Destructive/KillWindows.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Destructive/Main.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Destructive/ProcessWatchdog.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/MEMZ.h
-
MEMZ-5.0-beta/WindowsTrojan/Source/Payloads/PayloadCrazyBus.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Payloads/PayloadCursor.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Payloads/PayloadDrawErrors.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Payloads/PayloadExecute.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Payloads/PayloadInvert.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Payloads/PayloadKeyboard.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Payloads/PayloadMessageBox.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Payloads/PayloadReverseText.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Payloads/PayloadScreenGlitches.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Payloads/PayloadSound.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Payloads/PayloadTunnel.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Payloads/Payloads.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Payloads/Payloads.h
-
MEMZ-5.0-beta/WindowsTrojan/Source/Utils/MsgBoxHook.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Utils/Random.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Utils/StrReverse.c
-
MEMZ-5.0-beta/WindowsTrojan/Source/Utils/Utils.h
-
MEMZ-5.0-beta/WindowsTrojan/Source/exe2bat.py.py .vbs
-
MEMZ-Destructive.exe.vir.exe windows:4 windows x86 arch:x86
d94de48845868affa046a91651aab637
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
CryptAcquireContextW
CryptGenRandom
LookupPrivilegeValueW
OpenProcessToken
gdi32
BitBlt
StretchBlt
kernel32
CloseHandle
CreateFileA
CreateThread
CreateToolhelp32Snapshot
ExitProcess
GetCommandLineW
GetCurrentProcess
GetCurrentThreadId
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
GlobalAlloc
GlobalFree
K32GetProcessImageFileNameA
LoadLibraryA
LocalAlloc
LocalFree
OpenProcess
Process32FirstW
Process32NextW
SetPriorityClass
Sleep
WriteFile
lstrcmpA
lstrcmpW
lstrlenW
shell32
CommandLineToArgvW
ShellExecuteA
ShellExecuteExW
ShellExecuteW
user32
CallNextHookEx
CreateWindowExA
DefWindowProcW
DispatchMessageW
DrawIcon
EnumChildWindows
ExitWindowsEx
GetCursorPos
GetDesktopWindow
GetMessageW
GetSystemMetrics
GetWindowDC
GetWindowRect
LoadIconW
MessageBoxA
MessageBoxW
RegisterClassExA
SendInput
SendMessageTimeoutW
SetCursorPos
SetWindowsHookExW
TranslateMessage
UnhookWindowsHookEx
winmm
PlaySoundA
waveOutOpen
waveOutPrepareHeader
waveOutWrite
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 768B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
PhantasmA.exe.exe windows:5 windows x86 arch:x86
80a6e487c17c92916920ff7f418ef70c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\Users\ALAN\source\repos\test222\Release\Un-Named Malware..pdb
Imports
kernel32
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
DecodePointer
GetTickCount
CreateThread
TerminateThread
Sleep
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RaiseException
GetLastError
SetLastError
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
LCMapStringW
CloseHandle
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetStringTypeW
GetProcessHeap
CreateFileW
user32
ReleaseDC
GetDC
MessageBoxW
GetSystemMetrics
GetDesktopWindow
InvalidateRect
gdi32
BitBlt
CreateCompatibleBitmap
SelectObject
CreateDIBSection
CreateCompatibleDC
StretchBlt
CreatePolygonRgn
CreateEllipticRgn
InvertRgn
DeleteObject
DeleteDC
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
winmm
PlaySoundW
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 10.1MB - Virtual size: 10.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Purgatorium.exe.vir.exe windows:5 windows x86 arch:x86
81ca996850637413652c6c8e4c07807a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
E:\Programação\C++\GDI\MALWARE\Purgatorium\Debug\Purgatorium.pdb
Imports
kernel32
GetConsoleCP
HeapReAlloc
HeapSize
SetConsoleCtrlHandler
GetStringTypeW
GetConsoleMode
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetFilePointerEx
FlushFileBuffers
GetVersionExW
CopyFileW
FindNextFileW
FindFirstFileW
DeleteFileW
GetFileAttributesW
SetFileAttributesW
CreateFileW
GetModuleFileNameW
lstrlenA
lstrcpyW
CloseHandle
FindClose
Sleep
WriteFile
TerminateThread
CreateThread
HeapDestroy
SetStdHandle
HeapCreate
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
WaitForSingleObjectEx
OutputDebugStringW
OutputDebugStringA
GetFileType
GetCurrentThreadId
IsDebuggerPresent
RaiseException
MultiByteToWideChar
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
FreeLibrary
GetProcAddress
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
GetStartupInfoW
GetModuleHandleW
LoadLibraryExW
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
GetStdHandle
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
GetACP
GetCurrentThread
WaitForSingleObject
GetExitCodeProcess
CreateProcessA
CreateProcessW
GetFileAttributesExW
DecodePointer
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
WriteConsoleW
user32
SendMessageW
wsprintfW
DrawIcon
GetSystemMetrics
SendInput
GetDC
LoadIconW
FindWindowW
EnumChildWindows
GetWindowLongW
MessageBoxW
RedrawWindow
gdi32
TextOutA
CreateDIBSection
SetTextColor
SetStretchBltMode
StretchBlt
SetBkColor
SelectObject
PatBlt
Ellipse
DeleteObject
CreateSolidBrush
CreateFontIndirectW
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
BitBlt
advapi32
RegOpenKeyExW
RegCreateKeyW
RegCloseKey
RegSetValueExW
shell32
ShellExecuteW
msimg32
AlphaBlend
winmm
waveOutOpen
waveOutPrepareHeader
waveOutUnprepareHeader
waveOutWrite
waveOutReset
waveOutSetVolume
Sections
.text Size: 321KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msvcjmc Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Raindows-main.zip.zip
-
Raindows-main/Raindows.sln
-
Raindows-main/Raindows/Raindows.vcxproj.xml
-
Raindows-main/Raindows/Raindows.vcxproj.filters
-
Raindows-main/Raindows/Raindows.vcxproj.user
-
Raindows-main/Raindows/main.cpp
-
Raindows-main/Raindows-main/Raindows.sln
-
Raindows-main/Raindows-main/Raindows/Raindows.vcxproj.xml
-
Raindows-main/Raindows-main/Raindows/Raindows.vcxproj.filters
-
Raindows-main/Raindows-main/Raindows/Raindows.vcxproj.user
-
Raindows-main/Raindows-main/Raindows/main.cpp
-
SOURCE.c
-
Solaris-A65BA.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
destructive.txt
-
kernel-leaks-main/kernel-leaks-main/DDT/DDT.bin
-
kernel-leaks-main/kernel-leaks-main/DDT/SOURCE.c
-
kernel-leaks-main/kernel-leaks-main/DDT/mbr.txt
-
kernel-leaks-main/kernel-leaks-main/LEAKS.txt