Administrator.
Many malware samples contain debug strings that include paths often directly pointing to a location where the source code is stored and so it happens that often it’s also a location under the USERPROFILE. For the fun of it, I extracted the strings from a large batch of samples and came up with the following statistics (showing top 50):
3893 Administrator
2963 JUANJO
1121 ryanch
928 Boy
617 UserXP
612 user
519 1337
502 User
465 Admin
435 root
422 bld4act
418 Owner
347 nosferatus
305 Administrateur
300 M4x
296 ismael
277 goga
277 Kyle
255 Mirko
247 1134
244 kdglkrkjdfhslej
241 FEDERIKO
234 t0fx
231 rstephens
219 DarkCoderSc
218 gcc
205 icyheart
200 Dave
197 michael
197 Roshan
197 James
195 Ben
182 John
178 admin
173 Dev
161 box1
157 nonadmin
153 FELIPE
152 Familie
151 Timothy
137 Dhivin
133 Vortex
131 Robert
130 dabdoub
129 USER
127 dr zinou
125 packar
122 David
116 nathu
116 Daniel
It’s obviously biased.
Other interesting names include:
- tom age five
- GANGSTA
- Krusty the Clown
- ^_^
- ItchyFingerz
- irishboy
- romantic
- lol
- brad pitt
- Love Bebe
- LorD^^$$steal3R
- Cyber-Warrior Ender
- auchan
- F-B-I
- Valued Sony Customer
- SexyReplay
- Microsoft
- Poo
- Trojan
- P@wn3d
- Emperor Zhou Tai Nu
There are over 7000 account names on the list. If you want the full list, please contact me offline.