PE Compile Time

2018-02-03 20:58:37

PE Imphash

40306b615af659fc1f93cfb121cc38d9

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00008000 0x00008000 6.29686185829
.rdata 0x00009000 0x00009000 0x00008600 6.13220990861
.data 0x00012000 0x00001000 0x00000c00 3.45019507088
.CRT 0x00013000 0x00001000 0x00000200 0.0611628522412
.rsrc 0x00014000 0x00001000 0x00000200 4.71006138269
.reloc 0x00015000 0x00001000 0x00000c00 6.43441035042

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x00014060 0x0000017d LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document, ASCII text, with CRLF line terminators

Imports

Library KERNEL32.dll:
0x409058 SetFilePointer
0x40905c GetFileAttributesW
0x409060 ReadFile
0x409064 GetLastError
0x409068 MoveFileW
0x40906c lstrcpyW
0x409070 SetFileAttributesW
0x409074 CreateMutexW
0x409078 GetDriveTypeW
0x40907c VerSetConditionMask
0x409080 WaitForSingleObject
0x409084 GetTickCount
0x40908c OpenProcess
0x409090 GetSystemDirectoryW
0x409094 TerminateThread
0x409098 Sleep
0x40909c TerminateProcess
0x4090a0 VerifyVersionInfoW
0x4090b0 lstrlenW
0x4090b8 lstrcatA
0x4090bc MultiByteToWideChar
0x4090c0 CreatePipe
0x4090c4 lstrcmpiA
0x4090c8 Process32NextW
0x4090d8 FindFirstFileW
0x4090dc lstrcmpW
0x4090e0 FindClose
0x4090e4 FindNextFileW
0x4090e8 GetNativeSystemInfo
0x4090ec GetComputerNameW
0x4090f0 GetDiskFreeSpaceW
0x4090fc LoadLibraryA
0x409100 lstrcmpiW
0x409104 VirtualFree
0x409108 CreateThread
0x40910c CloseHandle
0x409110 lstrcatW
0x409114 CreateFileMappingW
0x409118 ExitThread
0x40911c CreateFileW
0x409120 GetModuleFileNameW
0x409124 WriteFile
0x409128 GetModuleHandleW
0x40912c UnmapViewOfFile
0x409130 MapViewOfFile
0x409134 GetFileSize
0x40913c lstrcpyA
0x409140 GetModuleHandleA
0x409144 VirtualAlloc
0x409148 Process32FirstW
0x40914c GetTempPathW
0x409150 GetProcAddress
0x409154 GetProcessHeap
0x409158 HeapFree
0x40915c HeapAlloc
0x409160 lstrlenA
0x409164 CreateProcessW
0x409168 ExitProcess
Library USER32.dll:
0x409190 wsprintfW
0x409194 TranslateMessage
0x409198 RegisterClassExW
0x40919c LoadIconW
0x4091a0 SetWindowLongW
0x4091a4 EndPaint
0x4091a8 BeginPaint
0x4091ac LoadCursorW
0x4091b0 GetMessageW
0x4091b4 ShowWindow
0x4091b8 CreateWindowExW
0x4091bc SendMessageW
0x4091c0 DispatchMessageW
0x4091c4 DefWindowProcW
0x4091c8 UpdateWindow
0x4091cc GetForegroundWindow
0x4091d0 DestroyWindow
Library GDI32.dll:
0x409050 TextOutW
Library ADVAPI32.dll:
0x409000 CryptExportKey
0x409008 RegSetValueExW
0x40900c RegCreateKeyExW
0x409010 RegCloseKey
0x409018 CryptGetKeyParam
0x40901c CryptReleaseContext
0x409020 CryptImportKey
0x409024 CryptEncrypt
0x409028 CryptGenKey
0x40902c CryptDestroyKey
0x409030 GetUserNameW
0x409034 RegQueryValueExW
0x409038 RegOpenKeyExW
0x40903c FreeSid
Library SHELL32.dll:
0x409184 ShellExecuteExW
0x409188 ShellExecuteW
Library CRYPT32.dll:
Library WININET.dll:
0x4091d8 InternetCloseHandle
0x4091e0 HttpSendRequestW
0x4091e4 InternetConnectW
0x4091e8 HttpOpenRequestW
0x4091ec InternetOpenW
0x4091f0 InternetReadFile
Library PSAPI.DLL:
0x409174 EnumDeviceDrivers

!This =
n6m cannot be run in DOS mode.
`.rdata
@.rsrc
@.reloc
SVWj@h
D$DP,@
<}tK<=tBF
<}t)F<=t
HthHuo
<}tcG<=t
SVWj@h
SVWj@h
D$$PQh
D$$PWh
D$$PWh
SVWj@h
SVWj@h
QSVWj@h
0SWj@h
L&&jl66Z~??A
Oh44\Q
sb11S*
uB!!c
D""fT**~;
;d22Vt::N
J%%o\..r8
gg}V++
jL&&Zl66A~??
Sb11?*
tX,,.4
RRMv;;a
MMUf33
PPDx<<
cB!!0
~~Gz==
fD""~T**
Vd22Nt::
xxoJ%%r\..$8
tt!>
ppB|>>
aa_j55
UUxP((z
&jL&6Zl6?A~?
~=Gz=d
"fD"*~T*
2Vd2:Nt:
x%oJ%.r\.
t!>K
a5_j5W
=&&jL66Zl??A~
g99KrJJ
==Gzdd
""fD**~T
22Vd::Nt
$$lH\\
77Ynmm
%%oJ..r\
!>KK
55_jWW
[T:$6.
[.:$6g
j_FbT~
h4,8$@_
2\tHlWB
PQAeS~
~4[C)v
8$4,6-9'$6.:*?#1pHhX~AeSlZrNbS
EHl\tFeQ
T~FbZwKi
,8$4'6-9:$6.1*?#XpHhS~AeNlZrEbS
FeQbT~FiZwK
4,8$9'6-.:$6#1*?hXpHeS~ArNlZ
EbS\tHlQ
FeFbT~KiZw
$4,8-9'66.:$?#1*HhXpAeS~ZrNlS
Ebl\tHeQ
F~FbTwKiZ
pub_key
DELETE}
{DELETE}
advapi32.dll
CheckTokenMembership
Address:
fabian wosar <3
Can't find server
aeriedjD#shasj
*******************
RtlComputeCrc32
GandCrabGandCrabnomoreransom.bit|
ExitProcess
lstrlenA
HeapAlloc
HeapFree
GetProcessHeap
GetProcAddress
VirtualAlloc
GetModuleHandleA
lstrcpyA
GetEnvironmentVariableW
GetFileSize
MapViewOfFile
UnmapViewOfFile
GetModuleHandleW
WriteFile
GetModuleFileNameW
CreateFileW
ExitThread
lstrlenW
GetTempPathW
CreateFileMappingW
lstrcatW
CloseHandle
CreateThread
VirtualFree
lstrcmpiW
lstrcmpiA
SetFilePointer
GetFileAttributesW
ReadFile
GetLastError
MoveFileW
lstrcpyW
SetFileAttributesW
CreateMutexW
GetDriveTypeW
VerSetConditionMask
WaitForSingleObject
GetTickCount
InitializeCriticalSection
OpenProcess
GetSystemDirectoryW
TerminateThread
TerminateProcess
VerifyVersionInfoW
WaitForMultipleObjects
DeleteCriticalSection
ExpandEnvironmentStringsW
CreateProcessW
SetHandleInformation
lstrcatA
MultiByteToWideChar
CreatePipe
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
LeaveCriticalSection
EnterCriticalSection
FindFirstFileW
lstrcmpW
FindClose
FindNextFileW
GetNativeSystemInfo
GetComputerNameW
GetDiskFreeSpaceW
GetWindowsDirectoryW
GetVolumeInformationW
LoadLibraryA
KERNEL32.dll
DispatchMessageW
DefWindowProcW
UpdateWindow
SendMessageW
CreateWindowExW
ShowWindow
SetWindowLongW
LoadIconW
RegisterClassExW
TranslateMessage
wsprintfW
BeginPaint
LoadCursorW
GetMessageW
DestroyWindow
EndPaint
GetForegroundWindow
USER32.dll
TextOutW
GDI32.dll
RegCloseKey
RegCreateKeyExW
RegSetValueExW
AllocateAndInitializeSid
FreeSid
CryptExportKey
CryptAcquireContextW
CryptGetKeyParam
CryptReleaseContext
CryptImportKey
CryptEncrypt
CryptGenKey
CryptDestroyKey
GetUserNameW
RegQueryValueExW
RegOpenKeyExW
ADVAPI32.dll
ShellExecuteExW
ShellExecuteW
SHGetSpecialFolderPathW
SHELL32.dll
CryptStringToBinaryA
CryptBinaryToStringA
CRYPT32.dll
InternetOpenW
InternetReadFile
InternetConnectW
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetCloseHandle
WININET.dll
GetDeviceDriverBaseNameW
EnumDeviceDrivers
PSAPI.DLL
IsProcessorFeaturePresent
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
1#1-171A1i1s1}1
2:2D2N2X2b2l2v2
33)333=3G3^3h3r3|3
4/494C4M4W4g4q4{4
5(585B5L5V5~5
6'6O6Y6c6m6w6
6 7*747>7H7R7\7s7}7
8#8-8D8N8X8b8l8|8
99)939=9M9W9a9k9
:(:2:<:d:n:x:
;5;?;I;S;];g;q;
='=1=;=E=m=w=
>?>I>S>]>g>q>{>
?%?/?9?C?M?e?o?y?
0070A0K0U0_0o0y0
1'111A1K1U1_1
2'212Y2c2m2w2
3+353?3I3S3]3g3
4%4/494Q4[4e4o4y4
5#5-575A5K5[5e5o5y5
6-676A6K6s6}6
7E7O7Y7c7m7w7
7N8k8{8
<0<7<I<Z<b<
>0>U>[>j>w>
1S2]2d2u2
6(6Z6e6m6
8-989p9x9
:#:1:8:H:N:
=-=B=H=
>'>L>j>
0"0)030:0D0Q0k0
151A1I1Q1V1
6W6_6g6o6w6
77*757@7K7V7a7l7w7
8&8-878L8e8
:.:4:T:Z:|:
:/;=;q;{;
>&>+>1>;>U>g>
>N?\?y?
0(0-050=0g0m0
2!222Q2`2
3+3=3L3S3a3
44,494D4l4s4
::R:\:n:~:
>%>/>;>D>P>
0$000:0J0V0
1%1*1@1T1h1|1
232D2p2x2
5&5-5U5s5~5
6/6W6^6e6
6%7+707G7q7~7
8808[8i8p8~8
9%989=9M9\9e9{9
:,:::N:\:p:~:
;";);7;E;X;i;w;
< <6<A<W<b<x<
<(=I=Y=h=q=
=!>&>B>J>
>B?b?m?
0 0P0b0}0
20292H2Z2_2s2~2
33&3-343S3[3
3 4*434<4R4^4f4r4}4
5*5R5Y5`5g5n5u5|5
6'6L6Q6Y6a6h6v6
:4:a:k:u:
;4;b;n;t;
=O>]>l>
>6?C?R?\?b?
00g0n0~0
0$1+1;1H1s1z1
2H2O2^2h2n2
3$333=3C3
7#7+7074787a7
9A9H9L9P9T9X9\9`9d9
jjjjjj
AppData
\Microsoft\
GandCrab!
win32app
firefox
ransom_id
os_bit
os_major
pc_keyb
pc_lang
pc_group
pc_name
pc_user
ransom_id=
{USERID}
Global\
msftesql.exe
sqlagent.exe
sqlbrowser.exe
sqlservr.exe
sqlwriter.exe
oracle.exe
ocssd.exe
dbsnmp.exe
synctime.exe
mydesktopqos.exe
agntsvc.exeisqlplussvc.exe
xfssvccon.exe
mydesktopservice.exe
ocautoupds.exe
agntsvc.exeagntsvc.exe
agntsvc.exeencsvc.exe
firefoxconfig.exe
tbirdconfig.exe
ocomm.exe
mysqld.exe
mysqld-nt.exe
mysqld-opt.exe
dbeng50.exe
sqbcoreservice.exe
excel.exe
infopath.exe
msaccess.exe
mspub.exe
onenote.exe
outlook.exe
powerpnt.exe
steam.exe
thebat.exe
thebat64.exe
thunderbird.exe
visio.exe
winword.exe
wordpad.exe
/c timeout -c 5 & del "%s" /f /q
cmd.exe
Content-Type: application/x-www-form-urlencoded
curl.php?token=
action=result&e_files=%d&e_size=%I64u&e_time=%d&
action=call&
&pub_key=
&priv_key=
&version=2.1
Microsoft Enhanced Cryptographic Provider v1.0
\ProgramData\
\Program Files\
\Tor Browser\
Ransomware
\All Users\
\Local Settings\
desktop.ini
autorun.inf
ntuser.dat
iconcache.db
bootsect.bak
boot.ini
ntuser.dat.log
thumbs.db
GDCB-DECRYPT.txt
%s\GDCB-DECRYPT.txt
ipv4bot.whatismyipaddress.com
undefined
Domain
SYSTEM\CurrentControlSet\services\Tcpip\Parameters
WORKGROUP
LocaleName
Control Panel\International
Keyboard Layout\Preload
00000419
productName
SOFTWARE\Microsoft\Windows NT\CurrentVersion
SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion
Itanium
Unknown
ProcessorNameString
HARDWARE\DESCRIPTION\System\CentralProcessor\0
Identifier
2ntdll.dll
UNKNOWN
NO_ROOT_DIR
REMOVABLE
REMOTE
RAMDISK
%I64u/
AVP.EXE
ekrn.exe
avgnt.exe
ashDisp.exe
NortonAntiBot.exe
Mcshield.exe
avengine.exe
cmdagent.exe
smc.exe
persfw.exe
pccpfw.exe
fsguiexe.exe
cfp.exe
msmpeng.exe
HTTP/1.1
No antivirus signatures available.
IRMA Signature
Trend Micro SProtect (Linux) Ransom_GANDCRAB.SMALY-4
Avast Core Security (Linux) Win32:MalwareX-gen [Ransom]
C4S ClamAV (Linux) Win.Ransomware.Gandcrab-6667060-0
Trellix (Linux) GenericRXDY-EJ
Sophos Anti-Virus (Linux) Troj/GandCrab-A
Bitdefender Antivirus (Linux) Generic.Ransom.GandCrab.C3AA3758
G Data Antivirus (Windows) Virus: Generic.Ransom.GandCrab.C3AA3758 (Engine A), Win32.Trojan-Ransom.GandCrab.D (Engine B)
WithSecure (Linux) Trojan.TR/FileCoder.oytet
ESET Security (Windows) Win32/Filecoder.GandCrab.B trojan
DrWeb Antivirus (Linux) Trojan.Encoder.27154
ClamAV (Linux) Win.Ransomware.Gandcrab-6667060-0
eScan Antivirus (Linux) Generic.Ransom.GandCrab.C3AA3758(DB)
Kaspersky Standard (Windows) Trojan-Ransom.Win32.GandCrypt.jes
Emsisoft Commandline Scanner (Windows) Trojan.Agent (A)
Cuckoo

We're processing your submission... This could take a few seconds.