Static | ZeroBOX

PE Compile Time

2009-07-14 08:41:43

PE Imphash

ef8a44fe2f9ad4ab85e55004aaa024a9

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000399d 0x00003a00 6.44786917548
.data 0x00005000 0x000003b8 0x00000400 0.218734171598
.rsrc 0x00006000 0x00006760 0x00006800 5.70241060723
.reloc 0x0000d000 0x00000250 0x00000400 4.54466995317

Resources

Name Offset Size Language Sub-language File type
MUI 0x0000c690 0x000000d0 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0000c1b0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0000c1b0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0000c1b0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0000c1b0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0000c1b0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0000c1b0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0000c1b0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0000c1b0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x0000c618 0x00000076 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x00006590 0x000003a0 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x00006930 0x00000164 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text
RT_MANIFEST 0x00006930 0x00000164 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library KERNEL32.dll:
0x941000 HeapSetInformation
0x941004 QueryActCtxW
0x941008 CloseHandle
0x94100c SetFilePointer
0x941010 ReadFile
0x941014 CreateFileW
0x941018 LocalFree
0x94101c lstrlenA
0x941020 WideCharToMultiByte
0x941024 LocalAlloc
0x941028 lstrlenW
0x94102c GetProcAddress
0x941030 WaitForSingleObject
0x941034 CreateProcessW
0x941038 GetCommandLineW
0x941040 GetSystemDirectoryW
0x941044 GetNativeSystemInfo
0x941048 IsWow64Process
0x94104c GetCurrentProcess
0x941050 SetProcessDEPPolicy
0x941054 FormatMessageW
0x941058 GetLastError
0x94105c LoadLibraryExW
0x941060 FreeLibrary
0x941064 ExitProcess
0x941068 SetErrorMode
0x941074 LoadLibraryExA
0x941078 Sleep
0x94107c GetStartupInfoW
0x941080 InterlockedExchange
0x941088 GetModuleHandleA
0x941090 GetTickCount
0x941094 GetCurrentThreadId
0x941098 GetCurrentProcessId
0x9410a0 TerminateProcess
0x9410a8 CompareStringW
0x9410ac ReleaseActCtx
0x9410b0 DeactivateActCtx
0x9410b4 GetFileAttributesW
0x9410b8 SearchPathW
0x9410bc CreateActCtxW
0x9410c0 GetModuleHandleW
0x9410c4 ActivateActCtx
Library USER32.dll:
0x9410cc LoadIconW
0x9410d0 CharNextW
0x9410d4 DefWindowProcW
0x9410d8 GetClassLongW
0x9410dc GetClassNameW
0x9410e0 GetWindow
0x9410e4 GetWindowLongW
0x9410e8 SetWindowLongW
0x9410ec SetClassLongW
0x9410f0 CreateWindowExW
0x9410f4 RegisterClassW
0x9410f8 LoadCursorW
0x9410fc LoadStringW
0x941100 MessageBoxW
0x941104 DestroyWindow
Library msvcrt.dll:
0x94110c iswalpha
0x941110 _wtoi
0x941114 wcschr
0x941118 __wgetmainargs
0x94111c memset
0x941120 _vsnwprintf
0x941124 __set_app_type
0x941128 _controlfp
0x941130 ?terminate@@YAXXZ
0x941134 __p__fmode
0x941138 __p__commode
0x94113c __setusermatherr
0x941140 _amsg_exit
0x941144 _initterm
0x941148 _wcmdln
0x94114c exit
0x941150 _XcptFilter
0x941154 _exit
0x941158 _cexit
Library imagehlp.dll:
Library ntdll.dll:
0x941168 NtClose
0x94116c NtOpenProcessToken
0x941174 RtlImageNtHeader

!This program cannot be run in DOS mode.
`.data
@.reloc
KERNEL32.dll
USER32.dll
msvcrt.dll
imagehlp.dll
ntdll.dll
VWVVVV
tGPPWSV
t$j\Xf;B
j\_f9>u
PSSSSSS
ole32.dll
CoCreateInstance
CLSIDFromString
CoInitializeEx
CoUninitialize
ntdll.dll
imagehlp.dll
msvcrt.dll
USER32.dll
KERNEL32.dll
HeapSetInformation
QueryActCtxW
CloseHandle
SetFilePointer
ReadFile
CreateFileW
LocalFree
lstrlenA
WideCharToMultiByte
LocalAlloc
lstrlenW
GetProcAddress
WaitForSingleObject
CreateProcessW
GetCommandLineW
Wow64EnableWow64FsRedirection
GetSystemDirectoryW
GetNativeSystemInfo
IsWow64Process
GetCurrentProcess
SetProcessDEPPolicy
FormatMessageW
GetLastError
LoadLibraryExW
FreeLibrary
ExitProcess
SetErrorMode
DelayLoadFailureHook
InterlockedCompareExchange
LoadLibraryExA
GetStartupInfoW
InterlockedExchange
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
CompareStringW
ReleaseActCtx
DeactivateActCtx
GetFileAttributesW
SearchPathW
CreateActCtxW
GetModuleHandleW
ActivateActCtx
LoadIconW
CharNextW
DefWindowProcW
GetClassLongW
GetClassNameW
GetWindow
GetWindowLongW
SetWindowLongW
SetClassLongW
CreateWindowExW
RegisterClassW
LoadCursorW
LoadStringW
MessageBoxW
DestroyWindow
iswalpha
wcschr
__wgetmainargs
memset
_vsnwprintf
__set_app_type
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
_XcptFilter
_cexit
ImageDirectoryEntryToData
NtClose
NtOpenProcessToken
NtSetInformationToken
RtlImageNtHeader
NtSetInformationProcess
NtQueryInformationToken
rundll32.pdb
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!-- Copyright (c) Microsoft Corporation -->
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" xmlns:asmv3="urn:schemas-microsoft-com:asm.v3" manifestVersion="1.0">
<assemblyIdentity
name="Microsoft.Windows.Shell.rundll32"
processorArchitecture="x86"
version="5.1.0.0"
type="win32"/>
<description>Rundll32</description>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
<?xml version='1.0' encoding='utf-8' standalone='yes'?>
<assembly
xmlns="urn:schemas-microsoft-com:asm.v1"
manifestVersion="1.0"
<assemblyIdentity
name="Microsoft.Windows.Shell.rundll32"
processorArchitecture="*"
type="win32"
version="5.1.0.0"
/>
<description>Rundll32</description>
</assembly>
wwwwwwwwwq
nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXnnnnnnnnnnnnkkaaaaagddddddddddddddddddddddddiiiXnnnnnnnnnnnnlTUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU!iXnnnnnnnnnnnnl
////////
44((((((( 2222UdXnnnnnnnnnnnnl
:////////
44((((((((( 22UdXnnnnnnnnnnnnj
/////////
44((((((( 22UdXnnnnnnnnnnnnj
:///////
44(((((((( UdXnnnnnnnnnnnnj
:////////
44(((((((( UgXnnnnnnnnnnnnj
////////
444((((((( VaXnnnnnnnnnnnnQ
/////////
44(((((((VaXnnnnnnnnnnnnQ
////////
4((((((VaXnnnnnnnnnnnnh
////////
4(((((VaXnnnnnnnnnnnnh
:////////
44(((WaXnnnnnnnnnnnnP
......
////////
44((WfXnnnnnnnnnnnnP
......
:////////
44WfXnnnnnnnnnnnnF
......
:////////
4W_XnnnnnnnnnnnnF
......
:////////
[_XnnnnnnnnnnnnO
......
/////////
[_XnnnnnnnnnnnnO
......
:////////
[bXnnnnnnnnnnnnE
........
////////
[]XnnnnnnnnnnnnE
......
////////[]XnnnnnnnnnnnnC
.......
://////[]XnnnnnnnnnnnnC
.......
://///[]Xnnnnnnnnnnnn<
......
:////^]Xnnnnnnnnnnnn<
///^]Xnnnnnnnnnnnn;
......
:/^\Xnnnnnnnnnnnn;
.......
^\Xnnnnnnnnnnnn8
......
`\Xnnnnnnnnnnnn8
......
`JXnnnnnnnnnnnn?
......
`JXnnnnnnnnnnnn?
......
`JXnnnnnnnnnnnn7
......
`ZXnnnnnnnnnnnn7RS
.....eZXnnnnnnnnnnnn3
....eDXnnnnnnnnnnnn3
...eDXnnnnnnnnnnnn,
.eDXnnnnnnnnnnnn,
W[[^^`eYXnnnnnnnnnnnn,
HHIIIIYcjXnnnnnnnnnnnn+
-Xnnnnnnnnnnnnn+
&Xnnnnnnnnnnnnnn1
%Xnnnnnnnnnnnnnnn1
$Xnnnnnnnnnnnnnnnn"
#Xnnnnnnnnnnnnnnnnn"
'Xnnnnnnnnnnnnnnnnnn!
Xnnnnnnnnnnnnnnnnnnn!(( )))***6600555===>>>GGBInnnnnnnnnnnnnn
Pjnqw~
Gehiqr|
G]ceiqty~
?X\cgiltw}
?MSX]chmqty}
:HNRT\cfiovy}
:BHJQW\cghlouy
0@CDIMWY]agiqry~
+9=ADJLQW\cgilrw{
"46=@CFKRSX_cjknxy
",169>CDJNRX]cekprx}
)*.57;ABHNQR\`eilrx
#&,-489@BIJOWY]chkn
!&*-169=ADLNUT[chj
#',/26;ABHLQW\_e
!&)/46;@BCKQWZ]
%)-169>@CHMRX
#'*-47;>E
#&(-36;
!#(*14
"+0:?GP^d
D?;72-)#!
JF@<83.(%"
RLIB>:5/*&
WSNIC?;61-
_[TPJF@<74
d`\VPLGA=9$
lfb]XSMHB>'
rmic^YUOJD,
xsojeaZVPK0
zvpkga[WQ+
|wqmhEE
iK2%)U+
I/"bH4''99
Q7+<Y@3
T8,@X;1
Q:+BUB/
Q8,RZB1`@@
N. HY7!
O3$dS7"%U9
2,252@2L2
3-363=3Q3X3
4(444L4|4
565;5A5F5K5P5U5[5c5n5t5
8%8*878H8N8Y8
909H9R9X9a9
:)<:<V<a<g<
=*=R=g=
2L2W2j2
4/555j5
8;9^9u9
=L>P>[>v>{>
? ?)?4?B?G?M?X?_?h?l?w?|?
RunDLL
.manifest
requestedRunLevel
{00000000-0000-0000-0000-000000000000}
\\?\Volume
::$DATA
\\?\UNC\
rundll32.exe
VS_VERSION_INFO
StringFileInfo
040904B0
CompanyName
Microsoft Corporation
FileDescription
Windows host process (Rundll32)
FileVersion
6.1.7600.16385 (win7_rtm.090713-1255)
InternalName
rundll
LegalCopyright
Microsoft Corporation. All rights reserved.
OriginalFilename
RUNDLL32.EXE
ProductName
Microsoft
Windows
Operating System
ProductVersion
6.1.7600.16385
VarFileInfo
Translation
Antivirus Signature
Bkav Clean
Lionic Clean
tehtris Clean
DrWeb Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
McAfee Clean
Cylance Clean
VIPRE Clean
Sangfor Clean
CrowdStrike Clean
Alibaba Clean
K7GW Clean
K7AntiVirus Clean
BitDefenderTheta Clean
VirIT Clean
Cyren Clean
Symantec Clean
Elastic Clean
ESET-NOD32 Clean
APEX Clean
Paloalto Clean
Cynet Clean
Kaspersky Clean
BitDefender Clean
NANO-Antivirus Clean
SUPERAntiSpyware Clean
MicroWorld-eScan Clean
Tencent Clean
Sophos Clean
F-Secure Clean
Baidu Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition Clean
Trapmine suspicious.low.ml.score
FireEye Clean
Emsisoft Clean
Ikarus Clean
Jiangmin Clean
Webroot Clean
Avira Clean
MAX Clean
Antiy-AVL Clean
Microsoft Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Clean
ViRobot Clean
ZoneAlarm Clean
GData Clean
Google Clean
AhnLab-V3 Clean
Acronis Clean
ALYac Clean
TACHYON Clean
VBA32 Clean
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Clean
Yandex Clean
SentinelOne Clean
MaxSecure Clean
Fortinet Clean
AVG Clean
Avast Clean
No IRMA results available.