Static | ZeroBOX

PE Compile Time

2021-08-11 09:08:08

PE Imphash

48cf05311e4a3e8be7b754cbebbc2209

PEiD Signatures

Armadillo v1.71

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00004d27 0x00004e00 6.05636913542
.rdata 0x00006000 0x00001454 0x00001600 5.09104103764
.data 0x00008000 0x000019d4 0x00000200 0.0572566022412
.rsrc 0x0000a000 0x000001e0 0x00000200 4.70150325825

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x0000a060 0x0000017d LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library COMCTL32.dll:
0x406004 CreateToolbarEx
0x406008 CreateStatusWindowW
0x40600c PropertySheetW
Library KERNEL32.dll:
0x406040 GetLocalTime
0x406044 VirtualProtect
0x406048 GetModuleHandleW
0x40604c LoadLibraryW
0x406050 HeapFree
0x406054 lstrcmpW
0x406058 lstrcmpiW
0x40605c lstrcpynW
0x406060 lstrcpyW
0x406064 lstrcatW
0x406068 lstrlenW
0x40606c GetDateFormatW
0x406070 GetTimeFormatW
0x406074 GetModuleHandleA
0x406078 HeapReAlloc
0x40607c HeapAlloc
0x406080 GetLastError
0x406084 CloseHandle
0x406088 WriteFile
0x40608c SetFilePointer
0x406090 GetProcessHeap
0x406094 ReadFile
0x406098 CreateFileW
0x40609c GetCommandLineW
0x4060a0 MulDiv
0x4060a4 GetStartupInfoA
Library USER32.dll:
0x40611c InvalidateRect
0x406120 SetWindowTextA
0x406124 SetWindowTextW
0x406128 GetWindowTextA
0x40612c GetWindowTextW
0x406134 GetClientRect
0x406138 GetWindowRect
0x40613c MessageBoxA
0x406140 MessageBoxW
0x406144 MessageBoxIndirectW
0x406148 ClientToScreen
0x40614c MapWindowPoints
0x406150 GetSysColorBrush
0x406154 IntersectRect
0x406158 IsRectEmpty
0x40615c GetWindowLongW
0x406160 ReleaseDC
0x406164 LoadCursorW
0x406168 LoadIconW
0x40616c LoadImageW
0x406170 IsDialogMessageW
0x406174 MonitorFromRect
0x406178 GetMonitorInfoW
0x40617c TrackPopupMenu
0x406180 PostQuitMessage
0x406184 DefWindowProcW
0x406188 PostMessageW
0x40618c SendMessageW
0x406190 PeekMessageW
0x406194 DispatchMessageW
0x406198 TranslateMessage
0x40619c GetMessageW
0x4061a4 wsprintfW
0x4061a8 LoadStringW
0x4061ac GetDC
0x4061b0 RegisterClassExW
0x4061b4 GrayStringW
0x4061b8 SetMenuItemInfoW
0x4061bc TrackPopupMenuEx
0x4061c0 GetSubMenu
0x4061c4 EnableMenuItem
0x4061c8 CheckMenuItem
0x4061cc SetMenu
0x4061d0 GetMenu
0x4061d4 LoadMenuW
0x4061d8 GetSystemMetrics
0x4061e0 LoadAcceleratorsW
0x4061e4 EnableWindow
0x4061e8 SetFocus
0x4061ec IsDlgButtonChecked
0x4061f0 CheckRadioButton
0x4061f4 CheckDlgButton
0x4061f8 GetDlgItem
0x4061fc EndDialog
0x406200 DialogBoxParamW
0x406204 IsWindowVisible
0x406208 MoveWindow
0x40620c GetMenuItemInfoW
0x406210 ShowWindow
0x406214 SetWindowLongW
0x406218 CreateWindowExW
0x40621c SetActiveWindow
Library GDI32.dll:
0x40602c GetDeviceCaps
0x406030 SelectObject
0x406034 GetTextExtentPointW
0x406038 EnumFontFamiliesExW
Library COMDLG32.dll:
0x406014 ChooseFontW
0x406018 ReplaceTextW
0x40601c GetSaveFileNameW
0x406020 GetOpenFileNameW
0x406024 FindTextW
Library SHELL32.dll:
0x406108 DragAcceptFiles
0x40610c DragFinish
0x406110 DragQueryFileW
0x406114 ShellAboutW
Library MSVCRT.dll:
0x4060ac _controlfp
0x4060b0 _except_handler3
0x4060b4 __set_app_type
0x4060b8 __p__fmode
0x4060bc __p__commode
0x4060c0 _adjust_fdiv
0x4060c4 __setusermatherr
0x4060c8 _initterm
0x4060cc __getmainargs
0x4060d0 _acmdln
0x4060d4 exit
0x4060d8 _XcptFilter
0x4060dc _exit
0x4060e0 memset
0x4060e4 memcpy
0x4060e8 isspace
0x4060ec atoi
0x4060f0 wcstod
0x4060f4 qsort
0x4060f8 _errno
0x4060fc _onexit
0x406100 __dllonexit

!This program cannot be run in DOS mode.
`.rdata
@.data
t"j4h(b@
j0h(b@
t.j"Yf;
SSPPhA
VSh$d@
PPh@d@
PPh@d@
XPPPPj
PPh\d@
uj0h(b@
WWWWWP
jjXPjjjhS
j@h(b@
tj@h(b@
j3h(b@
j@h(b@
j@h(b@
Error code %u
selection = %d..%d, line count=%ld
Start = %d, End = %d
Editor
.text$mn
.idata$5
.rdata
.rdata$zzzdbg
.idata$2
.idata$3
.idata$4
.idata$6
.CRT$XCA
.CRT$XCZ
.CRT$XIA
.CRT$XIZ
.rsrc$01
.rsrc$02
PropertySheetW
InitCommonControlsEx
CreateToolbarEx
CreateStatusWindowW
COMCTL32.dll
GetCommandLineW
CreateFileW
ReadFile
SetFilePointer
WriteFile
CloseHandle
GetLastError
HeapAlloc
HeapReAlloc
HeapFree
GetProcessHeap
GetLocalTime
VirtualProtect
GetModuleHandleW
LoadLibraryW
MulDiv
lstrcmpW
lstrcmpiW
lstrcpynW
lstrcpyW
lstrcatW
lstrlenW
GetDateFormatW
GetTimeFormatW
KERNEL32.dll
LoadStringW
wsprintfW
RegisterWindowMessageW
GetMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
SendMessageW
PostMessageW
DefWindowProcW
PostQuitMessage
RegisterClassExW
CreateWindowExW
ShowWindow
MoveWindow
IsWindowVisible
DialogBoxParamW
EndDialog
GetDlgItem
CheckDlgButton
CheckRadioButton
IsDlgButtonChecked
SetFocus
EnableWindow
LoadAcceleratorsW
TranslateAcceleratorW
GetSystemMetrics
LoadMenuW
GetMenu
SetMenu
CheckMenuItem
EnableMenuItem
GetSubMenu
TrackPopupMenu
TrackPopupMenuEx
GetMenuItemInfoW
SetMenuItemInfoW
GrayStringW
SetActiveWindow
ReleaseDC
InvalidateRect
SetWindowTextA
SetWindowTextW
GetWindowTextA
GetWindowTextW
GetWindowTextLengthW
GetClientRect
GetWindowRect
MessageBoxA
MessageBoxW
MessageBoxIndirectW
ClientToScreen
MapWindowPoints
GetSysColorBrush
IntersectRect
IsRectEmpty
GetWindowLongW
SetWindowLongW
LoadCursorW
LoadIconW
LoadImageW
IsDialogMessageW
MonitorFromRect
GetMonitorInfoW
USER32.dll
EnumFontFamiliesExW
GetDeviceCaps
GetTextExtentPointW
SelectObject
GDI32.dll
GetOpenFileNameW
GetSaveFileNameW
FindTextW
ReplaceTextW
ChooseFontW
COMDLG32.dll
DragQueryFileW
DragFinish
DragAcceptFiles
ShellAboutW
SHELL32.dll
_errno
wcstod
isspace
memcpy
memset
MSVCRT.dll
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
__dllonexit
_onexit
GetModuleHandleA
GetStartupInfoA
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
B|x:{&
O4;k^U
AV&ES!
c&a 8B{
\C~I\
{tbTRJ
ag~QnW
ag~Q~W
ag~QnW
bWvK(
)#6BSY
i@!~*,
(SYF8Ex
~QR|8y')X
-zBI6+
u#`4Nj
xnL2u_
N(]p(d
vj.^Iz
X$h02
oUI.h'
_*QTv7
&`oe]o
s7C1D5
52? nW
jS:$0<3
!$EnOe
k.[6N=
N3G~:[
8BEt_
eIzn *kq
K7U'G)
M@ KE1
QE G\A
2@q;B,
IAM[!D
K\D:j[
A/m'.]
s737B1U
rIC`^^
'j"o7*
nWy]@V
_|mDC_
xIK7c!
sgg7Bl
UfJ(L%
bE(3C/
`n~:[v
X=NVF~Y
$6#P7R%
RD#Ddj_
jHWo/.
kF'"W&
Aui91j
n]M&+,
A'2")$
n,2-kcnh
gLt%k=L
Z?y9dU/
-:z%b7
daxTsQR
*t'bU[y
nUI+DP
G,,cW|k9<l)
#:Ks;w
B+F(g}XK
g+fjtiF
?hm:wX4_
l5yR9z
vqa@g=
&AC7TE
<39~/
CepIZa%
>/JY[
ag?,nW
mTp}$iY
`S"\eqas
IJV4|H
vq)O'^(
,t&!DF
Ew$~W
4s2H7B
o_Tb?"
nW.D+w
*Lkyo4
RG@kCGoTJ
t{_T%V"
]JWe#1
=C55t;7TEWB
=eg5tk
4wt7B>xCn
G\\!k
B45^[E,
sAJ7Bm~1n-
R+wyvpX
e"jEis
!*qPD2
R{@qCYf
^v`qA|
TuAvpdfEt
`)J[+L
Mv.$M
[}sQ0gE
v)TgO]
$OX\`E,-
[oJVak
v)TeO9"
s1$hurf
&sA$h.k
D\6 A0w
Ao6gIC(
M%D6i
K7LT!`
{Gl1"YS
7`u-m<
;>`&~Im:
Pc!lk$sI
R^0c)b
Y>)|KN
)Oi8pL
Yze9/A
LLoE$l*
8+tRuZ
ySBl`o[
%}v'2j
EY^g[@
T[v$[AY
[]vP8M
bTL;FXy
ejott=
Uv)kpAe)
|EKlLeZot!
[`8[%`%
K71g~Q)/
bEkFBs
rjti2g
]*l*Qu
JqAurb1
DNfCdL
5[`[%`%
{r44lU
2LQp*hx
U{GT@v4
4br2L^
ag~QnW
A6+MP7
_i@b{
_wC-
$"jp,.
j9~*Vu
VA<+OP
AR+cP$
AzqT77
irb{{
iub1R
Ka}~On
qAYqV7a
,9~*Vu
.iwb*
uAcqc7
$ag~Qn
ag~Qn:
.iwb*
69J*,u
A.qe77
bidb{K
"AYqI7
A(+XPX
/9~*VuE
A%qw7
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
ag~QnW
/i]kqz
L"aVK
v1^+o1
-(%^b^
9{''GHR
vc;7?Vcb
U\El_4V
"Jegx"
us\S^d
7<X;NUO
7^q(6w)
QYe8p<&
>N43auZ%\
x`}D'<
$p?r8l
|6fv8-A
a'Iz@T
T3SAf
DDGLk+
sh yN9
84@xdm-
L7keD>
'HCh`Y
vRBMpD_=@
PzR^mN
G>HgpE
@m4fL<E
VM&#i/
6qb#`2U
UM.dTO
d fBJ;
}-XD/8
RM&4&r
<uK.#=
6qnj$G
xV{<Lk
y:fE_8r
t*D{05
mB|ZdP
t8y0Ez
Nrs2I
]D(Z.X
bv4l'Q1W
#mZE7H
a45tmn
eIIAf>,I
=OE:nO+
HljlXC0
%k~q|fK
v0NhrJ
'owxjl6
-%t8)L}
OEHn
NVD>,u
s=rS9~2
j"Q$<!&
TdDsQn/
kf|1LR
j*0PZ}t
:18U$'
S(v{WD^H1q
Ut!w7|%
`K+>j&
dJ>hUn3
E>u/u`
ZJ[Cj>Z~
IDu/ =T
oc3#D{
tq+6<WD{QT
l`A!mU`
Xkpc\c
.2hKvz
bqPT5P
5_|xk
,{@Nom
t:YN9y
5M[}C$q)mhm!Ik
<3I2M=
:^R*E|
D.ZL\.
EPOSlr
2vD~>.$
\HNl*Y
y3\SOFU
dU-#mS
,>,zK@
bX2Q2l
FZ"d,
+xTw!)6
t`sj_^
$bY3vB
>\0f%L
y%}Rl0S
a><ztq
[@1BMW
i v>MQ#%*
zBFTws
8zEkJ|
YvPBh)
9 Ddu>
!nqF98
;`[Yj%mb
coM H-
)!V^ cV
21]8nd
eJaF#n
/a4|z_
W E[1c
<h}q>g
BUs;#u
&WVi$n
!3OO)~mJ
br80XI
KZi,k;
1.}pH%5
N%0 nC!
oBetY'fggkxzT
Gp")Bl
IHO&zH(
Z{#@rT[J
Qd?I35m
0-w1*3v
0Q1(Z#a
DnCp-!`
xw8BvB
gVe!b|
NZciH}
O_gkvV
3y4vhu
O$1D\=
hSD#ho[Qf
m.KMwlNo
Kg[JSx
'WY#`4
)'[>k?2
&H-IW&T
m:1E$
rTeZ&0
=VHM&YW
?f1Ljt
>1Bk'Nu
Wqjbl3
)D5R1d6(
/6Z)pU
q90oa(
o3;8eVh
IPI8^iz
v+5=,VIG>
/O3&@3mI
v>pf;@
4AglDcy=
"8^!sGl
y#z{.lb
n\w-}3
MR#w+SwJ\
.:TW76
K\CD~t
p>X>3@
.v_7%A
5#wHn@R@h
A>wo5>
.O`=.>=
Wine Wordpad
WORDPADTOP
PrtPreview
Times New Roman
Courier New
%.2f %s
RICHED20.DLL
RichEdit text
Times New Roman
MAINACCELTABLE
ReBarWindow32
ComboBoxEx32
Static
commdlg_FindReplace
Antivirus Signature
Bkav W32.AIDetect.malware2
Lionic Trojan.Win32.Zbot.lx9X
Elastic malicious (high confidence)
Cynet Malicious (score: 100)
FireEye Generic.mg.cfdbd2b514b9d9b0
CAT-QuickHeal Clean
Qihoo-360 Clean
McAfee Artemis!CFDBD2B514B9
Cylance Unsafe
Zillya Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
CrowdStrike win/malicious_confidence_100% (W)
Baidu Clean
Cyren Clean
Symantec ML.Attribute.HighConfidence
ESET-NOD32 Clean
APEX Malicious
Paloalto generic.ml
ClamAV Clean
Kaspersky UDS:Backdoor.Win32.Androm.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Clean
Tencent Clean
Ad-Aware Clean
Sophos Clean
Comodo Clean
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Generic.dc
CMC Clean
Emsisoft Clean
SentinelOne Clean
GData Clean
Jiangmin Clean
Webroot Clean
Avira Clean
MAX Clean
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
Microsoft Trojan:Win32/Sabsik.FL.B!ml
AhnLab-V3 Clean
Acronis Clean
VBA32 BScope.Trojan-Dropper.Injector
ALYac Clean
TACHYON Clean
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Trojan.Kryptik!1.D84E (CLASSIC)
Yandex Clean
Ikarus Clean
eGambit Unsafe.AI_Score_83%
Fortinet W32/Kryptik.HLWI!tr
BitDefenderTheta Gen:NN.ZexaF.34058.pqZ@a0Wwetki
AVG FileRepMalware
Cybereason Clean
Avast FileRepMalware
MaxSecure Clean
No IRMA results available.