Static | ZeroBOX

PE Compile Time

2020-06-09 09:17:16

PE Imphash

dc25ee78e2ef4d36faa0badf1e7461c9

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00001d44 0x00001e00 5.85555507789
.data 0x00003000 0x00042424 0x00042600 6.48747543161
.rdata 0x00046000 0x000002f4 0x00000400 4.35483400198
.bss 0x00047000 0x0000045c 0x00000000 0.0
.idata 0x00048000 0x000006ec 0x00000800 4.60683621574
.CRT 0x00049000 0x00000034 0x00000200 0.249129902058
.tls 0x0004a000 0x00000020 0x00000200 0.22482003451

Imports

Library KERNEL32.dll:
0x448138 CloseHandle
0x44813c ConnectNamedPipe
0x448140 CreateFileA
0x448144 CreateNamedPipeA
0x448148 CreateThread
0x448154 FreeLibrary
0x448158 GetCurrentProcess
0x44815c GetCurrentProcessId
0x448160 GetCurrentThreadId
0x448164 GetLastError
0x448168 GetModuleHandleA
0x44816c GetProcAddress
0x448170 GetStartupInfoA
0x448178 GetTickCount
0x448184 LoadLibraryA
0x448188 LoadLibraryW
0x448190 ReadFile
0x448198 Sleep
0x44819c TerminateProcess
0x4481a0 TlsGetValue
0x4481a8 VirtualAlloc
0x4481ac VirtualProtect
0x4481b0 VirtualQuery
0x4481b4 WriteFile
Library msvcrt.dll:
0x4481bc __dllonexit
0x4481c0 __getmainargs
0x4481c4 __initenv
0x4481c8 __lconv_init
0x4481cc __set_app_type
0x4481d0 __setusermatherr
0x4481d4 _acmdln
0x4481d8 _amsg_exit
0x4481dc _cexit
0x4481e0 _fmode
0x4481e4 _initterm
0x4481e8 _iob
0x4481ec _lock
0x4481f0 _onexit
0x4481f4 _unlock
0x4481f8 _winmajor
0x4481fc abort
0x448200 calloc
0x448204 exit
0x448208 fprintf
0x44820c free
0x448210 fwrite
0x448214 malloc
0x448218 memcpy
0x44821c signal
0x448220 sprintf
0x448224 strlen
0x448228 strncmp
0x44822c vfprintf

!This program cannot be run in DOS mode.
P`.data
.rdata
0@.bss
.idata
3l$(3l$,1
bC4R6t
(u#mb
#mb*YR
u$mb%Q
u^$mb,Ww
"mb%4E
u#"mb,
uD5mb"4
2u-2mb
u=>mb,
bC4Hht
bE4(ht
mb%45I
[^ W~b
_jbzIS
A!mb%#
RuF#mb,Wbu
#mb W~
ju;'mb
"mbu4B
#ye W~
u7!mb,
uhfmb,
$]%4-+
u-jmb,#
u9jmb,#
umimb,
bE4|Wt
"mb,YR
u`#mb,W
u7!mbzkR
rs4$Zt
^ W~<%
u'*mbzkB
&mb$WJu&+mb
 9#mb
,mb%WQ
1mb,YR
ud6mb"#
tt0mb#WSu
tu2mb$4
#mtQ#mb#
#mtb#mb*
t\pmb
t7"mbF
#mtv!mb
?mb,Wj
[^ W~u)
pmb,YR
*mbu4:
Z0 rKw
#mbu]h
x(^Q W~
ftY#mb
#mbu]h
x(^Q W~
ftY#mb
m#4K6u
#mt\#mb
z[^ W~
(u#mb
^ W~bpT
#mb(3
uFcmbF
u"mb%#
u&mb%4
nu=#mb,#
S7b@L
u``mb,
uH#mb&4^
u?dmb,
uv#mb,
SVcWC\
"SRcWL\
SVcWe\
gv/SRlWH\
%SRlWK\
$SRcWZ\
SVcW]\
$SRlWJ\
"SRlWL\
%SRcWC\
&SRcW`\
,SSlWj\
SVcWl\
&SRlWH\
&SRcWH\
SWlWj\
SVcWE\
%SRlWK\
&SRcWH\
<)FY
&SRcW`\
"SRlWL\
$SRlWJ\
SVcWk\
"SRcW\\
%SRcWC\
.SScWh\
YW\u-:mb
YW\u}:mb
t]#mb
u,"mb,
[^ W~b
nu# mb
eWQuK,mb
to#mb W~
bQY,hu
Lu}#mb
uy"mbv
,WUvrWjv
_P#mbzU
#mb W~
#_Rc"Wk
kOZziw
UP#mbz
,Wjv{#
iP#mbzU
VuQ-mb"Q
Fuv5mb
u>7mb,
#mb%4Jt
^%Wauw8mb
WTu*mbF
Fu;(mb
u3>mb,
uo>mb,
$Sun]ub
)p`}b
,S{qQ&
h_lbzX
#mu`9mbL
(,)@`}b
S}qQ&
\+WS^F
A#mb%Q
%(A#mb
Q#mb%Q
m%WbuW
A#mb%Q
BuC+mb
>Mi]sb
amb*zR
buTamb
mb%WTub
F#yR W~
}Wjv<_
^uK4mb
mv'dmb
b W~u%
YaWTvEW
b W~ud
v{]pbu
vZ0 lb
vZ0 lb
WSvrWQj
vZ0 lb
Yy_jbzIS
vZ0 lb
,_Zb(
RvwWUa*
mN"4.~
[}]l5g
[}]l5g
>mb,4Y`
u]#mb,
eNT@*Yu
8$mvx_S}
nZ0 lb
vwWPk5
!mbzQk
#mu[)mb
!mbu5r
'vi_E
;mb,_/E
tU_STN
8 mvz*
_q]ku`
dmb,YR
!mb,#B
u3lmb,W
u_lmb,W
&mb,#B
nu9&mb
OF#m{ W~
Y9mbtY
I9mb^Y
8I9mbu
Y9mbtY
19mb^Y
19mbzk
u?#mb,_jb
ZbQY&/t
zj[vz_j
~t)"mbF
u#ombF#
u4?mb,
u^Cmb,_Zb
}uHAmb
ZbQY&St
u1mb,YR
uYmb,YR
mb,WTu
uKRmb,_
0mb,WJ
57tb@D
&#EZ0 lb
uMUmb,y
"mb,Yd
#muqemb
vZ0 lb
YaWTv##
otl#mb
+S{w}R
uQ`mb,*
w_]b"#
Yy_jbzX
YaWUv,_
%UzjSk1
uDpmb,
uPwmb,
]}Wbvw
]te_t
y#mbzj
E"mbzj
Y'mbzj
%&mbzj
e%mbzj
U+mbzj
1*mbzj
q)mbzj
!(mbzj
U/mbzj
q-mbzj
!,mbzj
t*#mbF
Ye_jbzX
8,zp8#m
zFh#m
u1kmb,#
u7Jmb,
#zCE#mZu
zZ`#m
Rt&"mb
%Tzj@\
 q#mb
+}]sbu
 5#mb
+}]sbu
 =2mb
Q3mb$W
Q3mb$Q
 5#mb
 5#mb
vZ0 lb
[#mbH#mbJ
zuw)lb
'mbzX%
WTvz_RcM
1lb,7y
#mb,Wb
#mb,WB
+8%S}}
{bor/3
?040FI
0?*!=206
Vc69&+
78$(wx
87:9if
Pf:5>?
4;"-&)
vS3<,$
lzl"E(
ywLA9cd}-
\pBH>yPS7
mxo#a`{/@"
fnr(xRP6
zVV4O<
BsDM=jvf$
[{TU5\
w0DRc(=
E.7"Vn
q:+Xe;
c_j&68`*
l0A>6-&
e,+:=b
ZBNnEn
8vvBqJ
xi=bor/ib{!
Hq4+Ex: Rc(=_j&6|U
9Ds-0Jx:+Xe7"Vn
ci|,IX_%GSR>UNE7[EH@
0= />6-&,+:=" 74xI|CvBqJd_fQjTkX@eHgNnEn\sRuRx_|
0cxa<L
Mdw]SO
q}UpZ7
_set_invalid_parameter_handler
libgcj-12.dll
_Jv_RegisterClasses
%c%c%c%c%c%c%c%c%cMSSE-%d-server
mingwm10.dll
__mingwthr_remove_key_dtor
__mingwthr_key_dtor
Unknown error
_matherr(): %s in %s(%g, %g) (retval=%g)
Argument domain error (DOMAIN)
Argument singularity (SIGN)
Overflow range error (OVERFLOW)
The result is too small to be represented (UNDERFLOW)
Total loss of significance (TLOSS)
Partial loss of significance (PLOSS)
Mingw-w64 runtime failure:
Address %p has no image-section
VirtualQuery failed for %d bytes at address %p
VirtualProtect failed with code 0x%x
Unknown pseudo relocation protocol version %d.
Unknown pseudo relocation bit size %d.
CloseHandle
ConnectNamedPipe
CreateFileA
CreateNamedPipeA
CreateThread
DeleteCriticalSection
EnterCriticalSection
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
QueryPerformanceCounter
ReadFile
SetUnhandledExceptionFilter
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualProtect
VirtualQuery
WriteFile
__dllonexit
__getmainargs
__initenv
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_fmode
_initterm
_onexit
_unlock
_winmajor
calloc
fprintf
fwrite
malloc
memcpy
signal
sprintf
strlen
strncmp
vfprintf
KERNEL32.dll
msvcrt.dll
msvcrt.dll
Antivirus Signature
Bkav W32.AIDetect.malware1
Lionic Trojan.Win64.CozyDuke.trLC
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Trojan.Heur.rCW@ILpZfAc
FireEye Generic.mg.8d8d168e25d41e2d
CAT-QuickHeal Clean
ALYac Gen:Trojan.Heur.rCW@ILpZfAc
Cylance Unsafe
VIPRE Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Riskware ( 0040eff71 )
BitDefender Gen:Trojan.Heur.rCW@ILpZfAc
K7GW Riskware ( 0040eff71 )
CrowdStrike win/malicious_confidence_100% (W)
Baidu Clean
Cyren W32/Diple.F.gen!Eldorado
ESET-NOD32 a variant of Win32/Rozena.AMZ
APEX Malicious
Paloalto generic.ml
ClamAV Win.Trojan.CobaltStrike-7899872-1
Kaspersky HEUR:Trojan.Win32.CobaltStrike.gen
Alibaba Trojan:Win32/Rozena.b93c424d
NANO-Antivirus Trojan.Win32.Rozena.hpcmlv
ViRobot Trojan.Win32.Cobalt.284672.A
Tencent Hacktool.Win32.CobaltStrike.za
Ad-Aware Gen:Trojan.Heur.rCW@ILpZfAc
Emsisoft Trojan.Rozena (A)
Comodo Clean
F-Secure Clean
DrWeb BackDoor.Siggen2.247
Zillya Clean
TrendMicro Trojan.Win32.COBALT.SM
McAfee-GW-Edition BehavesLike.Win32.Generic.dh
CMC Clean
Sophos Mal/Generic-R + ATK/Cobalt-CC
SentinelOne Static AI - Malicious PE
GData Gen:Trojan.Heur.rCW@ILpZfAc
Jiangmin Trojan.Cometer.aww
Webroot Clean
Avira TR/Crypt.XPACK.Gen7
MAX malware (ai score=81)
Antiy-AVL Trojan/Generic.ASMalwS.30CAC8E
Kingsoft Win32.Troj.Undef.(kcloud)
Gridinsoft Trojan.Win32.Gen.oa!s1
Arcabit Trojan.Heur.E12B80
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Cobaltstrike.MK!MTB
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win32.CobaltStrike.R329694
Acronis suspicious
McAfee GenericRXMO-OO!8D8D168E25D4
TACHYON Trojan/W32.Agent.284672.IN
VBA32 Trojan.CobaltStrike
Malwarebytes Backdoor.Rozena
Panda Trj/CI.A
Zoner Clean
TrendMicro-HouseCall Trojan.Win32.COBALT.SM
Rising Backdoor.CobaltStrike!1.D049 (CLASSIC)
Yandex Trojan.GenAsa!/C5jzoNrl5s
Ikarus Trojan.Win32.Rozena
eGambit Unsafe.AI_Score_95%
Fortinet W32/Generic.AP.118EACE!tr
BitDefenderTheta AI:Packer.6EA876861B
AVG Win32:HacktoolX-gen [Trj]
Cybereason malicious.e25d41
Avast Win32:HacktoolX-gen [Trj]
MaxSecure Trojan.Malware.300983.susgen
No IRMA results available.