Static | ZeroBOX

PE Compile Time

2021-08-30 18:48:43

PE Imphash

7bda1659fc16105398114c734c6c6738

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000e6ec 0x0000e800 6.54522065845
.rdata 0x00010000 0x00007a86 0x00007c00 4.57060564675
.data 0x00018000 0x000017b8 0x00000a00 2.75066219759
.gfids 0x0001a000 0x00000110 0x00000200 1.90944294271
.rsrc 0x0001b000 0x000004d0 0x00000600 3.55029334738
.reloc 0x0001c000 0x0000108c 0x00001200 6.33868061532

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0001b0a0 0x000002b0 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_MANIFEST 0x0001b350 0x0000017d LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library KERNEL32.dll:
0x410000 WriteFile
0x41000c CreateFileW
0x410010 GetModuleHandleA
0x410014 GetLastError
0x410018 lstrcatW
0x41001c CloseHandle
0x410020 RaiseException
0x410024 DecodePointer
0x410028 GetProcAddress
0x410030 WriteConsoleW
0x410034 SetFilePointerEx
0x410038 GetConsoleMode
0x41003c GetConsoleCP
0x410040 FlushFileBuffers
0x410044 GetStringTypeW
0x410048 SetStdHandle
0x41004c GetFileType
0x410050 GetProcessHeap
0x410060 GetCPInfo
0x410064 GetOEMCP
0x410068 IsValidCodePage
0x41006c FindNextFileA
0x410070 IsDebuggerPresent
0x410074 OutputDebugStringW
0x410080 MultiByteToWideChar
0x410084 WideCharToMultiByte
0x410088 LocalFree
0x410094 GetCurrentProcess
0x410098 TerminateProcess
0x4100a0 GetStartupInfoW
0x4100a4 GetModuleHandleW
0x4100ac GetCurrentProcessId
0x4100b0 GetCurrentThreadId
0x4100b8 InitializeSListHead
0x4100bc EncodePointer
0x4100c0 RtlUnwind
0x4100c4 SetLastError
0x4100c8 TlsAlloc
0x4100cc TlsGetValue
0x4100d0 TlsSetValue
0x4100d4 TlsFree
0x4100d8 FreeLibrary
0x4100dc LoadLibraryExW
0x4100e0 ExitProcess
0x4100e4 GetModuleHandleExW
0x4100e8 GetModuleFileNameA
0x4100ec GetStdHandle
0x4100f0 GetCommandLineA
0x4100f4 GetCommandLineW
0x4100f8 GetACP
0x4100fc HeapFree
0x410100 HeapAlloc
0x410104 HeapSize
0x410108 HeapReAlloc
0x41010c CompareStringW
0x410110 LCMapStringW
0x410114 FindClose
0x410118 FindFirstFileExA
Library ole32.dll:
0x410160 CoUninitialize
0x410164 CoSetProxyBlanket
0x41016c CoCreateInstance
0x410170 CoInitialize
Library OLEAUT32.dll:
0x410120 SafeArrayGetDim
0x410124 VariantInit
0x410128 SafeArrayGetUBound
0x41012c SafeArrayGetLBound
0x410130 SysFreeString
0x410134 SysStringByteLen
0x41013c SysAllocString
0x410140 VariantCopy
0x410144 SysStringLen
0x41014c SysAllocStringLen
0x410150 SafeArrayAccessData
0x410154 VariantClear
0x410158 GetErrorInfo

!This program cannot be run in DOS mode.
`.rdata
@.data
.gfids
@.rsrc
@.reloc
QQSVWd
URPQQh
;t$,v-
UQPXY]Y[
QSSSSj
WWWPWS
u-PWWS
SSVWh
f9:t!V
|VWj=S
j,h`qA
QQSWj0j@
PPPPPPPP
PPPPPWS
PP9E u:PPVWP
Unknown exception
bad allocation
bad array new length
bad exception
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
CorExitProcess
CompareStringEx
GetCurrentPackageId
LCMapStringEx
LocaleNameToLCID
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
?5Wg4p
%S#[k=
"B <1=
_hypot
_nextafter
KERNEL32
LoadLibraryA
SHELL32
USER32
ShellExecuteExW
wsprintfW
GetEnvironmentVariableW
GetModuleFileNameW
GetConsoleWindow
ShowWindow
.text$di
.text$mn
.text$x
.text$yd
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCL
.CRT$XCU
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$r
.rdata$sxdata
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.data$r
.gfids$x
.gfids$y
.rsrc$01
.rsrc$02
WriteFile
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
CreateFileW
GetModuleHandleA
GetLastError
lstrcatW
CloseHandle
RaiseException
DecodePointer
GetProcAddress
DeleteCriticalSection
KERNEL32.dll
CoInitialize
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
ole32.dll
OLEAUT32.dll
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
WideCharToMultiByte
LocalFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
RtlUnwind
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
HeapSize
HeapReAlloc
CompareStringW
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetProcessHeap
GetFileType
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AV_com_error@@
.?AVtype_info@@
.?AVbad_alloc@std@@
.?AVexception@std@@
.?AVbad_array_new_length@std@@
.?AVbad_exception@std@@
.?AVCAtlException@ATL@@
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
0'0A0a2
34l4y4
<*<5<A<L<X<c<o<z<
="=(=*>
4+4V4v4
5;5G5R5^5B6N6Y6e607Y7o7
8F9U9j9z9
:#:9:L:a:n:
<&=+=:=
=5>P>i>
0&191L1X1h1y1
1;2H2o2w2
4)4$5c5l5w5~5
66%6/696I6Y6i6r6
7-7^7{7
7a8j8r8
9&9/9B9v9!:@:J:[:f:l:
:*;E;Q;`;i;v;
<$<*<2<7<]<b<
==$=(=,=0=
5G6O6a6
9)9=9Y9c9m9{9
:!:8;a;};
<<<L<c<k<
===F=K=P=t=
>1>9>>>N>X>}>
213C3_3
7"7+7<7N7i7
7)83898?8
;N;S;w<
===X=m=r=|=
1!20252F2L2W2_2j2p2{2
2!3)3B3T3`3h3
<$<Y<j<
=!=+=M=^=
> >M>T>_>m>t>z>
?5?=?d?}?
020N0Y0^0c0~0
1*141P1[1`1e1
2 2S2w2
3!353:3?3a3o3~3
6L7s7|8
9)9E9c9m9~9
: :*:::
<$=E=J=U=i=t=
2$2d2o2|2
<$<2<O<W<
>/>A>S>e>w>
3)4b4x4
=>=Y=f=t=
7!8.9B9
;P<q<x<
<8<C<P<b<
<G=\=e=n=
0!0)0G0O0
7L8W8b8h8q8
9.9M9x9
<#=)=.=4=E=
14576H6
8f9k9}9
1t2X4\4`4d4h4l4p4
5(6,6064686<6@6D6H6L6P6T6X6\6`6d6h6l6p6t6x6|6
7 7$7(7,7074787<7@7D7H7L7P7T7X7\7`7d7h7l7p7t7x7|7
0 0$0(0,0004080<0@0D0H0L0P0T0X0\0`0d0h0l0p0t0x0|0`5d5h5l5
9 9$9(9,9094989<9@9D9H9L9P9T9X9\9`9d9h9l9p9t9x9|9
: :$:(:,:0:4:8:<:@:D:H:L:P:T:X:\:`:
1$1,141<1D1L1T1\1d1l1t1|1
2$2,242<2D2L2T2\2d2l2t2|2
3$3,343<3D3L3T3\3d3l3t3|3
4$4,444<4D4L4T4\4d4l4t4|4
5$5,545<5D5L5T5\5d5l5t5|5
6$6,646<6D6L6T6\6d6l6t6|6
7$7,747<7D7L7T7\7d7l7t7|7
2 2(20282@2H2P2X2`2h2p2x2
3 3(30383@3H3P3X3`3h3p3x3
4 4(40484@4H4P4X4`4h4p4x4
5 5(50585@5H5P5X5`5h5p5x5
6 6(60686@6H6P6X6`6h6p6x6
7 7(70787@7H7P7X7`7h7p7x7
8 8(80888@8H8P8X8`8h8p8x8
2L<T<\<d<l<t<|<
T7X7`7
8$8(8,848L8\8`8p8t8x8|8
= =@=H=P=l=p=x=
> >4><>D>L>P>T>\>p>
?4?@?H?t?x?
080X0t0x0
181X1x1
2 2@2`2
6 6,60646P6T6h6l6p6t6x6|6
6D8`8x8
jjjjjj
ERROR : Unable to initialize critical section in CAtlBaseModule
Aadvapi32
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
mscoree.dll
Aapi-ms-win-appmodel-runtime-l1-1-1
api-ms-win-core-datetime-l1-1-1
api-ms-win-core-file-l2-1-1
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-kernel32-package-current-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
user32
Aja-JP
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
((((( H
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
CONOUT$
atlTraceGeneral
atlTraceCOM
atlTraceQI
atlTraceRegistrar
atlTraceRefcount
atlTraceWindowing
atlTraceControls
atlTraceHosting
atlTraceDBClient
atlTraceDBProvider
atlTraceSnapin
atlTraceNotImpl
atlTraceAllocation
atlTraceException
atlTraceTime
atlTraceCache
atlTraceStencil
atlTraceString
atlTraceMap
atlTraceUtil
atlTraceSecurity
atlTraceSync
atlTraceISAPI
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
ForceRemove
NoRemove
Delete
Component Categories
FileType
Interface
Hardware
SECURITY
SYSTEM
Software
TypeLib
rundll32.exe
VS_VERSION_INFO
StringFileInfo
007f04b0
CompanyName
VncViewe
FileDescription
VncViewe
FileVersion
1.0.0.1
InternalName
VncViewe.exe
LegalCopyright
Copyright (C) 2021
OriginalFilename
VncViewe.exe
ProductName
VncViewe
ProductVersion
1.0.0.1
VarFileInfo
Translation
Antivirus Signature
Bkav Clean
Lionic Clean
Elastic Clean
MicroWorld-eScan Trojan.GenericKD.46899149
FireEye Trojan.GenericKD.46899149
CAT-QuickHeal Clean
McAfee GenericRXAA-AA!7411BD9A3273
Cylance Unsafe
Zillya Trojan.Injector.Win32.1065746
Sangfor Clean
K7AntiVirus Riskware ( 0040eff71 )
BitDefender Trojan.GenericKD.46899149
K7GW Riskware ( 0040eff71 )
Cybereason Clean
Baidu Clean
Cyren W32/Trojan.WUMX-2818
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/TrojanDownloader.Agent.FVM
APEX Malicious
Paloalto generic.ml
ClamAV Clean
Kaspersky Trojan.Win32.Injector.lp
Alibaba TrojanDownloader:Win32/Injector.b38a2658
NANO-Antivirus Clean
ViRobot Trojan.Win32.Z.Ser.101376
Rising Clean
Ad-Aware Trojan.GenericKD.46899149
Emsisoft Trojan.GenericKD.46899149 (B)
Comodo Malware@#21hkfnn4u4u4t
F-Secure Clean
DrWeb Trojan.Inject4.16099
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition Artemis!Trojan
CMC Clean
Sophos Generic ML PUA (PUA)
SentinelOne Clean
GData Win32.Trojan.PSE.1HNXF2S
Jiangmin Trojan.Injector.dx
Webroot W32.Trojan.Gen
Avira TR/Redcap.wider
MAX malware (ai score=84)
Antiy-AVL Trojan/Generic.ASMalwS.3482E1C
Kingsoft Win32.PSWTroj.Undef.(kcloud)
Gridinsoft Trojan.Win32.Downloader.sa
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Sabsik.FL.A!ml
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.Generic.C4617150
Acronis Clean
BitDefenderTheta Clean
ALYac Trojan.GenericKD.46899149
TACHYON Clean
VBA32 TrojanDownloader.Zenlod
Malwarebytes Backdoor.Farfli
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Malware.Win32.Gencirc.11cbe747
Yandex Clean
Ikarus Trojan.SuspectCRC
MaxSecure Clean
Fortinet W32/PossibleThreat
AVG Win32:MalwareX-gen [Trj]
Avast Win32:MalwareX-gen [Trj]
CrowdStrike Clean
No IRMA results available.