Static | ZeroBOX

PE Compile Time

2009-07-14 08:41:43

PE Imphash

ef8a44fe2f9ad4ab85e55004aaa024a9

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000399d 0x00003a00 6.44644323096
.data 0x00005000 0x000003b8 0x00000400 0.218734171598
.rsrc 0x00006000 0x00006760 0x00006800 5.70241060723
.reloc 0x0000d000 0x00000250 0x00000400 4.54466995317

Resources

Name Offset Size Language Sub-language File type
MUI 0x0000c690 0x000000d0 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0000c1b0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0000c1b0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0000c1b0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0000c1b0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0000c1b0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0000c1b0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0000c1b0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0000c1b0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x0000c618 0x00000076 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x00006590 0x000003a0 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x00006930 0x00000164 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text
RT_MANIFEST 0x00006930 0x00000164 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library KERNEL32.dll:
0x381000 HeapSetInformation
0x381004 QueryActCtxW
0x381008 CloseHandle
0x38100c SetFilePointer
0x381010 ReadFile
0x381014 CreateFileW
0x381018 LocalFree
0x38101c lstrlenA
0x381020 WideCharToMultiByte
0x381024 LocalAlloc
0x381028 lstrlenW
0x38102c GetProcAddress
0x381030 WaitForSingleObject
0x381034 CreateProcessW
0x381038 GetCommandLineW
0x381040 GetSystemDirectoryW
0x381044 GetNativeSystemInfo
0x381048 IsWow64Process
0x38104c GetCurrentProcess
0x381050 SetProcessDEPPolicy
0x381054 FormatMessageW
0x381058 GetLastError
0x38105c LoadLibraryExW
0x381060 FreeLibrary
0x381064 ExitProcess
0x381068 SetErrorMode
0x381074 LoadLibraryExA
0x381078 Sleep
0x38107c GetStartupInfoW
0x381080 InterlockedExchange
0x381088 GetModuleHandleA
0x381090 GetTickCount
0x381094 GetCurrentThreadId
0x381098 GetCurrentProcessId
0x3810a0 TerminateProcess
0x3810a8 CompareStringW
0x3810ac ReleaseActCtx
0x3810b0 DeactivateActCtx
0x3810b4 GetFileAttributesW
0x3810b8 SearchPathW
0x3810bc CreateActCtxW
0x3810c0 GetModuleHandleW
0x3810c4 ActivateActCtx
Library USER32.dll:
0x3810cc LoadIconW
0x3810d0 CharNextW
0x3810d4 DefWindowProcW
0x3810d8 GetClassLongW
0x3810dc GetClassNameW
0x3810e0 GetWindow
0x3810e4 GetWindowLongW
0x3810e8 SetWindowLongW
0x3810ec SetClassLongW
0x3810f0 CreateWindowExW
0x3810f4 RegisterClassW
0x3810f8 LoadCursorW
0x3810fc LoadStringW
0x381100 MessageBoxW
0x381104 DestroyWindow
Library msvcrt.dll:
0x38110c iswalpha
0x381110 _wtoi
0x381114 wcschr
0x381118 __wgetmainargs
0x38111c memset
0x381120 _vsnwprintf
0x381124 __set_app_type
0x381128 _controlfp
0x381130 ?terminate@@YAXXZ
0x381134 __p__fmode
0x381138 __p__commode
0x38113c __setusermatherr
0x381140 _amsg_exit
0x381144 _initterm
0x381148 _wcmdln
0x38114c exit
0x381150 _XcptFilter
0x381154 _exit
0x381158 _cexit
Library imagehlp.dll:
Library ntdll.dll:
0x381168 NtClose
0x38116c NtOpenProcessToken
0x381174 RtlImageNtHeader

!This program cannot be run in DOS mode.
`.data
@.reloc
KERNEL32.dll
USER32.dll
msvcrt.dll
imagehlp.dll
ntdll.dll
VWVVVV
tGPPWSV
t$j\Xf;B
j\_f9>u
PSSSSSS
ole32.dll
CoCreateInstance
CLSIDFromString
CoInitializeEx
CoUninitialize
ntdll.dll
imagehlp.dll
msvcrt.dll
USER32.dll
KERNEL32.dll
HeapSetInformation
QueryActCtxW
CloseHandle
SetFilePointer
ReadFile
CreateFileW
LocalFree
lstrlenA
WideCharToMultiByte
LocalAlloc
lstrlenW
GetProcAddress
WaitForSingleObject
CreateProcessW
GetCommandLineW
Wow64EnableWow64FsRedirection
GetSystemDirectoryW
GetNativeSystemInfo
IsWow64Process
GetCurrentProcess
SetProcessDEPPolicy
FormatMessageW
GetLastError
LoadLibraryExW
FreeLibrary
ExitProcess
SetErrorMode
DelayLoadFailureHook
InterlockedCompareExchange
LoadLibraryExA
GetStartupInfoW
InterlockedExchange
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
CompareStringW
ReleaseActCtx
DeactivateActCtx
GetFileAttributesW
SearchPathW
CreateActCtxW
GetModuleHandleW
ActivateActCtx
LoadIconW
CharNextW
DefWindowProcW
GetClassLongW
GetClassNameW
GetWindow
GetWindowLongW
SetWindowLongW
SetClassLongW
CreateWindowExW
RegisterClassW
LoadCursorW
LoadStringW
MessageBoxW
DestroyWindow
iswalpha
wcschr
__wgetmainargs
memset
_vsnwprintf
__set_app_type
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
_XcptFilter
_cexit
ImageDirectoryEntryToData
NtClose
NtOpenProcessToken
NtSetInformationToken
RtlImageNtHeader
NtSetInformationProcess
NtQueryInformationToken
rundll32.pdb
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!-- Copyright (c) Microsoft Corporation -->
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" xmlns:asmv3="urn:schemas-microsoft-com:asm.v3" manifestVersion="1.0">
<assemblyIdentity
name="Microsoft.Windows.Shell.rundll32"
processorArchitecture="x86"
version="5.1.0.0"
type="win32"/>
<description>Rundll32</description>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
<?xml version='1.0' encoding='utf-8' standalone='yes'?>
<assembly
xmlns="urn:schemas-microsoft-com:asm.v1"
manifestVersion="1.0"
<assemblyIdentity
name="Microsoft.Windows.Shell.rundll32"
processorArchitecture="*"
type="win32"
version="5.1.0.0"
/>
<description>Rundll32</description>
</assembly>
wwwwwwwwwq
nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXnnnnnnnnnnnnkkaaaaagddddddddddddddddddddddddiiiXnnnnnnnnnnnnlTUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU!iXnnnnnnnnnnnnl
////////
44((((((( 2222UdXnnnnnnnnnnnnl
:////////
44((((((((( 22UdXnnnnnnnnnnnnj
/////////
44((((((( 22UdXnnnnnnnnnnnnj
:///////
44(((((((( UdXnnnnnnnnnnnnj
:////////
44(((((((( UgXnnnnnnnnnnnnj
////////
444((((((( VaXnnnnnnnnnnnnQ
/////////
44(((((((VaXnnnnnnnnnnnnQ
////////
4((((((VaXnnnnnnnnnnnnh
////////
4(((((VaXnnnnnnnnnnnnh
:////////
44(((WaXnnnnnnnnnnnnP
......
////////
44((WfXnnnnnnnnnnnnP
......
:////////
44WfXnnnnnnnnnnnnF
......
:////////
4W_XnnnnnnnnnnnnF
......
:////////
[_XnnnnnnnnnnnnO
......
/////////
[_XnnnnnnnnnnnnO
......
:////////
[bXnnnnnnnnnnnnE
........
////////
[]XnnnnnnnnnnnnE
......
////////[]XnnnnnnnnnnnnC
.......
://////[]XnnnnnnnnnnnnC
.......
://///[]Xnnnnnnnnnnnn<
......
:////^]Xnnnnnnnnnnnn<
///^]Xnnnnnnnnnnnn;
......
:/^\Xnnnnnnnnnnnn;
.......
^\Xnnnnnnnnnnnn8
......
`\Xnnnnnnnnnnnn8
......
`JXnnnnnnnnnnnn?
......
`JXnnnnnnnnnnnn?
......
`JXnnnnnnnnnnnn7
......
`ZXnnnnnnnnnnnn7RS
.....eZXnnnnnnnnnnnn3
....eDXnnnnnnnnnnnn3
...eDXnnnnnnnnnnnn,
.eDXnnnnnnnnnnnn,
W[[^^`eYXnnnnnnnnnnnn,
HHIIIIYcjXnnnnnnnnnnnn+
-Xnnnnnnnnnnnnn+
&Xnnnnnnnnnnnnnn1
%Xnnnnnnnnnnnnnnn1
$Xnnnnnnnnnnnnnnnn"
#Xnnnnnnnnnnnnnnnnn"
'Xnnnnnnnnnnnnnnnnnn!
Xnnnnnnnnnnnnnnnnnnn!(( )))***6600555===>>>GGBInnnnnnnnnnnnnn
Pjnqw~
Gehiqr|
G]ceiqty~
?X\cgiltw}
?MSX]chmqty}
:HNRT\cfiovy}
:BHJQW\cghlouy
0@CDIMWY]agiqry~
+9=ADJLQW\cgilrw{
"46=@CFKRSX_cjknxy
",169>CDJNRX]cekprx}
)*.57;ABHNQR\`eilrx
#&,-489@BIJOWY]chkn
!&*-169=ADLNUT[chj
#',/26;ABHLQW\_e
!&)/46;@BCKQWZ]
%)-169>@CHMRX
#'*-47;>E
#&(-36;
!#(*14
"+0:?GP^d
D?;72-)#!
JF@<83.(%"
RLIB>:5/*&
WSNIC?;61-
_[TPJF@<74
d`\VPLGA=9$
lfb]XSMHB>'
rmic^YUOJD,
xsojeaZVPK0
zvpkga[WQ+
|wqmhEE
iK2%)U+
I/"bH4''99
Q7+<Y@3
T8,@X;1
Q:+BUB/
Q8,RZB1`@@
N. HY7!
O3$dS7"%U9
2,252@2L2
3-363=3Q3X3
4(444L4|4
565;5A5F5K5P5U5[5c5n5t5
8%8*878H8N8Y8
909H9R9X9a9
:)<:<V<a<g<
=*=R=g=
2L2W2j2
4/555j5
8;9^9u9
=L>P>[>v>{>
? ?)?4?B?G?M?X?_?h?l?w?|?
RunDLL
.manifest
requestedRunLevel
{00000000-0000-0000-0000-000000000000}
\\?\Volume
::$DATA
\\?\UNC\
rundll32.exe
VS_VERSION_INFO
StringFileInfo
040904B0
CompanyName
Microsoft Corporation
FileDescription
Windows host process (Rundll32)
FileVersion
6.1.7600.16385 (win7_rtm.090713-1255)
InternalName
rundll
LegalCopyright
Microsoft Corporation. All rights reserved.
OriginalFilename
RUNDLL32.EXE
ProductName
Microsoft
Windows
Operating System
ProductVersion
6.1.7600.16385
VarFileInfo
Translation
Antivirus Signature
Bkav Clean
Lionic Clean
tehtris Clean
DrWeb Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
ALYac Clean
Malwarebytes Clean
VIPRE Clean
Sangfor Clean
K7AntiVirus Clean
Alibaba Clean
K7GW Clean
CrowdStrike Clean
BitDefenderTheta Clean
VirIT Clean
Cyren Clean
Symantec Clean
Elastic Clean
ESET-NOD32 Clean
APEX Clean
Paloalto Clean
Cynet Clean
Kaspersky Clean
BitDefender Clean
NANO-Antivirus Clean
SUPERAntiSpyware Clean
MicroWorld-eScan Clean
Tencent Clean
TACHYON Clean
Sophos Clean
F-Secure Clean
Baidu Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition Clean
Trapmine suspicious.low.ml.score
FireEye Clean
Emsisoft Clean
Ikarus Clean
Jiangmin Clean
Webroot Clean
Avira Clean
Antiy-AVL Clean
Microsoft Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Clean
ViRobot Clean
ZoneAlarm Clean
GData Clean
Google Clean
AhnLab-V3 Clean
Acronis Clean
McAfee Clean
MAX Clean
VBA32 Clean
Cylance Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Clean
Yandex Clean
SentinelOne Clean
MaxSecure Clean
Fortinet Clean
AVG Clean
Avast Clean
No IRMA results available.