Static | ZeroBOX

PE Compile Time

2021-08-23 05:41:19

PE Imphash

340cbb019799ff7ed95694815ec3e316

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00006b78 0x00006c00 5.99646343395
.rdata 0x00008000 0x00001770 0x00001800 5.24515102292
.data 0x0000a000 0x00000204 0x00000200 0.330300910335
.CRT 0x0000b000 0x00000014 0x00000200 0.24669804171
.rsrc 0x0000c000 0x00014788 0x00014800 6.11061391142
.reloc 0x00021000 0x0000074c 0x00000800 6.44596387341

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0000c180 0x000010a8 LANG_ENGLISH SUBLANG_ENGLISH_US dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
RT_RCDATA 0x0000d790 0x00012ff1 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x0000d228 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x0000d3a0 0x000003ec LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x0000d240 0x0000015a LANG_ENGLISH SUBLANG_ENGLISH_US ASCII text, with CRLF line terminators

Imports

Library KERNEL32.dll:
0x40813c DeleteAtom
0x408140 GetModuleHandleA
0x408144 CreateTimerQueue
0x408148 GetVersion
0x40814c GetSystemInfo
0x408150 GetCurrentThreadId
0x408154 GetCurrentProcessId
0x408158 GetCurrentProcess
0x408160 CreateEventW
0x408164 CreateMutexW
0x408170 AddAtomW
0x408174 GetProcessHeap
0x408178 HeapCreate
0x408180 UnlockFileEx
0x408184 SetFilePointerEx
0x408188 GetCommandLineW
0x40818c SetFilePointer
0x408190 LockFileEx
0x408194 GetLogicalDrives
0x408198 GetFileSizeEx
0x40819c GetFileSize
0x4081a4 CreateFileW
Library USER32.dll:
0x4081b0 LoadIconA
0x4081b4 DestroyIcon
0x4081b8 IsDialogMessageA
0x4081bc DestroyCursor
0x4081c0 LoadCursorA
0x4081c4 CheckMenuRadioItem
0x4081c8 FindWindowA
0x4081cc SetWindowLongA
0x4081d0 GetWindowLongA
0x4081d4 GetSysColorBrush
0x4081d8 GetSysColor
0x4081e0 ClientToScreen
0x4081e4 SetCursor
0x4081e8 MessageBoxA
0x4081ec GetWindowRect
0x4081f0 GetClientRect
0x4081f4 GetWindowTextA
0x4081f8 SetWindowTextA
0x4081fc RedrawWindow
0x408200 InvalidateRect
0x408204 SetActiveWindow
0x408208 SetMenuItemInfoA
0x40820c InsertMenuItemA
0x408210 TrackPopupMenu
0x408214 RemoveMenu
0x408218 AppendMenuA
0x40821c GetSubMenu
0x408220 EnableMenuItem
0x408224 CheckMenuItem
0x408228 DestroyMenu
0x40822c CreatePopupMenu
0x408230 GetSystemMenu
0x408234 GetMenu
0x408238 GetSystemMetrics
0x408244 LoadAcceleratorsA
0x408248 EnableWindow
0x40824c KillTimer
0x408250 SetTimer
0x408254 GetActiveWindow
0x408258 SetFocus
0x40825c CharLowerBuffA
0x408260 CharUpperA
0x408264 EmptyClipboard
0x40826c GetClipboardData
0x408270 SetClipboardData
0x408274 CloseClipboard
0x408278 OpenClipboard
0x40827c DefDlgProcA
0x408280 SendDlgItemMessageA
0x408284 IsDlgButtonChecked
0x408288 CheckRadioButton
0x40828c CheckDlgButton
0x408290 GetDlgItemTextA
0x408294 SetDlgItemTextA
0x408298 SetDlgItemInt
0x40829c GetDlgItem
0x4082a0 EndDialog
0x4082a4 DialogBoxParamA
0x4082a8 CreateDialogParamA
0x4082ac SetWindowPlacement
0x4082b0 GetWindowPlacement
0x4082b4 SetWindowPos
0x4082b8 MoveWindow
0x4082bc DestroyWindow
0x4082c0 IsMenu
0x4082c4 wvsprintfA
0x4082c8 wsprintfA
0x4082cc GetMessageA
0x4082d0 TranslateMessage
0x4082d4 DispatchMessageA
0x4082d8 IsWindow
0x4082dc GetClassInfoA
0x4082e0 UnregisterClassA
0x4082e4 RegisterClassA
0x4082e8 CallWindowProcA
0x4082ec PostQuitMessage
0x4082f0 PostMessageA
0x4082f4 SendMessageA
0x4082f8 GetCursorPos
Library GDI32.dll:
0x408048 GetCharWidthI
0x408054 GetRandomRgn
0x408058 PatBlt
0x40805c RestoreDC
0x408060 ResetDCW
0x408064 RemoveFontResourceW
0x408068 RoundRect
0x40806c SelectClipRgn
0x408070 GetObjectType
0x408074 GetDIBits
0x408078 GetCurrentObject
0x40807c GetCharABCWidthsW
0x408080 GetCharWidthFloatW
0x408084 GetCharWidth32W
0x408088 GetROP2
0x40808c ExtFloodFill
0x408090 EqualRgn
0x408094 EnumFontFamiliesW
0x408098 DeleteObject
0x40809c GetStockObject
0x4080a0 CreateFontIndirectA
0x4080a4 OffsetRgn
0x4080a8 SelectObject
0x4080ac GdiSetBatchLimit
0x4080b0 UnrealizeObject
0x4080b4 SetViewportOrgEx
0x4080b8 PolylineTo
0x4080bc PolyBezierTo
0x4080c0 LPtoDP
0x4080c4 GetObjectW
0x4080c8 GetObjectA
0x4080cc GetArcDirection
0x4080d0 StrokePath
0x4080d4 GetPath
0x4080d8 FillPath
0x4080dc AbortPath
0x4080e0 SetDIBColorTable
0x4080e8 SetWinMetaFileBits
0x4080f4 EnumEnhMetaFile
0x4080f8 GdiTransparentBlt
0x4080fc GdiAlphaBlend
0x408104 SetTextAlign
0x408108 SetTextColor
0x40810c SetSystemPaletteUse
0x408110 SetRectRgn
0x408114 StretchBlt
0x408118 SetLayout
0x40811c SetGraphicsMode
0x408120 SetDIBitsToDevice
0x408124 SetBitmapBits
0x408128 SetBkMode
0x40812c SetDCPenColor
0x408130 SetDCBrushColor
0x408134 Chord
Library WINSPOOL.DRV:
0x408300 ScheduleJob
0x408304 ReadPrinter
Library COMDLG32.dll:
0x408030 GetSaveFileNameA
0x408034 GetOpenFileNameA
Library ADVAPI32.dll:
0x408000 GetUserNameA
0x408004 RegQueryValueExA
0x408008 OpenProcessToken
0x408010 DecryptFileW
0x408018 RegSetValueA
0x40801c RegCloseKey
0x408020 RegCreateKeyA
0x408024 RegDeleteKeyA
0x408028 RegOpenKeyExA

!This program cannot be run in DOS mode.
`.rdata
@.data
@.rsrc
@.reloc
j}jnjt
j0j$jdj
j%j?j[j
Rj=j&h
.text$di
.text$mn
.idata$5
.rdata
.rdata$voltmd
.rdata$zzzdbg
.idata$2
.idata$3
.idata$4
.idata$6
.CRT$XCU
.rsrc$01
.rsrc$02
GetCommandLineW
CreateFileW
GetFileInformationByHandle
GetFileSize
GetFileSizeEx
GetLogicalDrives
LockFileEx
SetFilePointer
SetFilePointerEx
UnlockFileEx
QueryPerformanceFrequency
HeapCreate
GetProcessHeap
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateMutexW
CreateEventW
WaitForMultipleObjects
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetSystemInfo
GetVersion
CreateTimerQueue
GetModuleHandleA
DeleteAtom
AddAtomW
KERNEL32.dll
wvsprintfA
wsprintfA
GetMessageA
TranslateMessage
DispatchMessageA
SendMessageA
PostMessageA
PostQuitMessage
CallWindowProcA
RegisterClassA
UnregisterClassA
GetClassInfoA
IsWindow
IsMenu
DestroyWindow
MoveWindow
SetWindowPos
GetWindowPlacement
SetWindowPlacement
CreateDialogParamA
DialogBoxParamA
EndDialog
GetDlgItem
SetDlgItemInt
SetDlgItemTextA
GetDlgItemTextA
CheckDlgButton
CheckRadioButton
IsDlgButtonChecked
SendDlgItemMessageA
DefDlgProcA
OpenClipboard
CloseClipboard
SetClipboardData
GetClipboardData
EnumClipboardFormats
EmptyClipboard
CharUpperA
CharLowerBuffA
SetFocus
GetActiveWindow
SetTimer
KillTimer
EnableWindow
LoadAcceleratorsA
DestroyAcceleratorTable
TranslateAcceleratorA
GetSystemMetrics
GetMenu
GetSystemMenu
CreatePopupMenu
DestroyMenu
CheckMenuItem
EnableMenuItem
GetSubMenu
AppendMenuA
RemoveMenu
TrackPopupMenu
InsertMenuItemA
SetMenuItemInfoA
SetActiveWindow
InvalidateRect
RedrawWindow
SetWindowTextA
GetWindowTextA
GetClientRect
GetWindowRect
MessageBoxA
SetCursor
GetCursorPos
ClientToScreen
ChildWindowFromPoint
GetSysColor
GetSysColorBrush
GetWindowLongA
SetWindowLongA
FindWindowA
CheckMenuRadioItem
LoadCursorA
DestroyCursor
LoadIconA
DestroyIcon
IsDialogMessageA
USER32.dll
CreateFontIndirectA
DeleteObject
EnumFontFamiliesW
EqualRgn
ExtFloodFill
GetROP2
GetCharWidth32W
GetCharWidthFloatW
GetCharABCWidthsW
GetCurrentObject
GetDIBits
GetObjectType
GetRandomRgn
GetStockObject
GetTextCharacterExtra
GetTextExtentPoint32W
GetFontUnicodeRanges
GetCharWidthI
RemoveFontResourceExW
RemoveFontMemResourceEx
OffsetRgn
PatBlt
RestoreDC
ResetDCW
RemoveFontResourceW
RoundRect
SelectClipRgn
SelectObject
SetDCBrushColor
SetDCPenColor
SetBkMode
SetBitmapBits
SetDIBitsToDevice
SetGraphicsMode
SetLayout
StretchBlt
SetRectRgn
SetSystemPaletteUse
SetTextColor
SetTextAlign
SetTextJustification
GdiAlphaBlend
GdiTransparentBlt
EnumEnhMetaFile
GetEnhMetaFileHeader
GetEnhMetaFilePaletteEntries
SetWinMetaFileBits
ModifyWorldTransform
SetDIBColorTable
AbortPath
FillPath
GetPath
StrokePath
GetArcDirection
GetObjectA
GetObjectW
LPtoDP
PolyBezierTo
PolylineTo
SetViewportOrgEx
UnrealizeObject
GdiSetBatchLimit
GDI32.dll
ReadPrinter
ScheduleJob
FindFirstPrinterChangeNotification
FindClosePrinterChangeNotification
WINSPOOL.DRV
GetOpenFileNameA
GetSaveFileNameA
COMDLG32.dll
OpenProcessToken
AdjustTokenPrivileges
DecryptFileW
LookupPrivilegeValueA
GetUserNameA
RegCloseKey
RegCreateKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueA
ADVAPI32.dll
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
RtS;bl
zGeOg"
U#mbrs
gk,Wds
FNJP~I
[^J0wz
ia~{)
W\% 3x
om&5SI
,!a6#*
()Y=;6
)ZuY.Iq
i&&9/,
<^*q%e
3nczPf
UR[M]N
{<Z78Y
Z]mjxh+
%+'t6!
DKT0GacGeD
vne#A=
:k9/]DW
W]>Z,t
`0Zi}i
Z)}v4}:
.1fWKn1V
TvgFP<
h\M1/2
+~\R}z
0!0&0+01070=0C0H0M0S0Y0_0e0j0o0
1!1'1-13181=1C1I1O1U1Z1_1e1k1q1w1|1
2!2&2+21272=2C2H2M2S2Y2_2e2j2o2u2{2
33%3+31363;3A3G3M3S3X3]3c3i3o3u3z3
44$4)4/454;4A4F4K4Q4W4]4c4h4m4s4y4
4&5/5E5M5W5
6*6?6t6
757E7M7g7x7
9&9.9>9\9f9q9
<4<V<h<
=$=Z=h=
0+02080J0|0
203T3o3b4
7K8R8n8
?E?_?u?
0+1Q1q1
122=2J2n2
5&5m5t5
676O6a6
6$7:7C7
9F:Z:u:
=$=^=x=
2=2I2e2
3>3g3v3
4$5-5V5}5
6'626M6u6
979N9b9n9
93:L:f:
:*;7;H;_;e;u;
<:<F<T<a<l<
040:0~0
1F1]1g1m1y1
1-212?2u2{2
2(3F3R3
3 4D4H4W4
4(5?5Z5
8'8;8A8S8
:5:>:V:k:
:#;];b;
>*?1?Y?b?v?|?
787J7Q7f7
9=9Y9m9
==>=K=x=
2)2G2Y2x2
4)525A5
5 6$6(6,606
8L9P9T9X9\9`9
: :$:(:
:b;h;n;t;
GIp"!c
R6p7nb
J/'{SV
b,6y?;
w<Abo.
YM8!''
x$?I-d
}z@Ne@
?Oh!-q
8_d r.
qN6"\$"
)**]v[M
f}<L4<
'OP_g)
+0\L[q$
15q>8^
,<vOla6
3}T9'\
zEqlj#
J4YI_{
.}p#nu
`X=K9:Q
5y<C9&
5>OM9 -
[M1K|2F
N":%%W
^Mf3'/
Js0"tp
Washington1
Redmond1
Microsoft Corporation1.0,
%Microsoft Windows Production PCA 20110
150818171528Z
161118171528Z0p1
Washington1
Redmond1
Microsoft Corporation1
Microsoft Windows0
mQkTS!
MOPR1301
*31612+85cef474-af76-4076-90ff-a35e1e23d7de0
Chttp://www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl0a
Ehttp://www.microsoft.com/pkiops/certs/MicWinProPCA2011_2011-10-19.crt0
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
111019184142Z
261019185142Z0
Washington1
Redmond1
Microsoft Corporation1.0,
%Microsoft Windows Production PCA 20110
i%(\6
Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
Washington1
Redmond1
Microsoft Corporation1.0,
%Microsoft Windows Production PCA 2011
http://www.microsoft.com0
20160209013111.102Z0
Washington1
Redmond1
Microsoft Corporation1
MOPR1'0%
nCipher DSE ESN:B1B7-F67F-FEC21%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
100701213655Z
250701214655Z0|1
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
$`2X`F
Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
1http://www.microsoft.com/PKI/docs/CPS/default.htm0@
oK0D$"<
r~akow
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
151007181730Z
170107181730Z0
Washington1
Redmond1
Microsoft Corporation1
MOPR1'0%
nCipher DSE ESN:B1B7-F67F-FEC21%0#
Microsoft Time-Stamp Service0
Ehttp://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl0Z
>http://www.microsoft.com/pki/certs/MicTimStaPCA_2010-07-01.crt0
e(3g {
Washington1
Redmond1
Microsoft Corporation1
MOPR1'0%
nCipher DSE ESN:B1B7-F67F-FEC21%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1
MOPR1'0%
nCipher NTS ESN:4DE9-0C5E-3E091+0)
"Microsoft Time Source Master Clock0
20160208165731Z
20160209165731Z0w0=
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
rOxss\ClX\Lqm5FKr
PyLvQZ\QUh
6Ngv$SP XD.EhgAQXn6
AD.DYr5
WKMobW0N\QiqzUJmU\5SXdYOg\iFz8bv0A
pwXEZ2h.QQ,CcPWla
SPx0P@ZjZU$NuhxOY
yVJ9JzUmJB\Y8
AHsa\p8fgvnl3Xmd\Q7sNDbNaaeZ
afjh\M7yhVA7BSpn\qrg0F5
aztb9rdE\M8oyssSwjU\WzxwFo\bW
VS_VERSION_INFO
StringFileInfo
040904E4
Comments
Crowdin compulsio
CompanyName
Amassin
FileDescription
Footprint delineatin epidemi bloodlessnes conductiv
FileVersion
5.266.117.1
InternalName
Disburse
LegalCopyright
Copyright
Gyration chinke hanki
LegalTrademarks
Duchie expan explainin criminologis fourfol ballotin
OriginalFilename
Misprintin
ProductName
Doctora
ProductVersion
5.266.117.1
VarFileInfo
Translation
"Microsoft Window
Legal_Policy_Statement
Antivirus Signature
Bkav Clean
Elastic malicious (high confidence)
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
ALYac Trojan.GenericKD.37460878
Cylance Unsafe
Zillya Clean
Sangfor Spyware.Win32.Stealer.zym
K7AntiVirus Trojan ( 0058158e1 )
BitDefender Trojan.GenericKD.37460878
K7GW Trojan ( 0058158e1 )
CrowdStrike win/malicious_confidence_90% (W)
Baidu Clean
Cyren W32/Kryptik.FCU.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.HMFJ
APEX Clean
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky Trojan-Spy.Win32.Stealer.zym
Alibaba TrojanSpy:Win32/Stealer.2bc3f0fa
NANO-Antivirus Clean
SUPERAntiSpyware Clean
MicroWorld-eScan Trojan.GenericKD.37460878
Rising Clean
Ad-Aware Trojan.GenericKD.37460878
Sophos Mal/Generic-S
Comodo Clean
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition Artemis!Trojan
FireEye Generic.mg.e4c49f9d53f701a8
Emsisoft Trojan.GenericKD.37460878 (B)
Ikarus Trojan.Win32.Krypt
GData Trojan.GenericKD.37460878
Jiangmin TrojanSpy.Stealer.ewg
Webroot W32.Malware.Gen
Avira Clean
Antiy-AVL Trojan/Generic.ASMalwS.34767FD
Kingsoft Win32.Troj.Generic_a.a.(kcloud)
Gridinsoft Clean
Arcabit Trojan.Generic.D23B9B8E
ViRobot Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Woreflint.A!cl
TACHYON Clean
AhnLab-V3 Trojan/Win.Generic.C4606244
Acronis Clean
McAfee Artemis!E4C49F9D53F7
MAX malware (ai score=81)
VBA32 BScope.Trojan.Convagent
Malwarebytes Trojan.MalPack
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex TrojanSpy.Stealer!WECl2SFp+p4
SentinelOne Clean
eGambit Clean
Fortinet W32/GenKryptik.FJJT!tr
BitDefenderTheta Gen:NN.ZexaF.34110.jy2@ayQzsSci
AVG Win32:MalwareX-gen [Trj]
Avast Win32:MalwareX-gen [Trj]
MaxSecure Clean
No IRMA results available.