Static | ZeroBOX

PE Compile Time

2023-03-30 23:08:48

PE Imphash

928d4a09f8768ac7ee6c028cc8e46c06

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00013cf6 0x00013e00 6.65093584596
.rdata 0x00015000 0x00004508 0x00004600 6.07223286472
.data 0x0001a000 0x0002d69c 0x0002cc00 7.40089972487
.rsrc 0x00048000 0x00000490 0x00000600 2.69200242681

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x00048060 0x0000042c LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library KERNEL32.dll:
0x415008 MultiByteToWideChar
0x41500c FreeConsole
0x415014 SetFilePointer
0x415018 DeleteAtom
0x415020 AddAtomW
0x415024 CreateMutexW
0x415028 GetModuleHandleA
0x41502c SetEndOfFile
0x415030 SetFilePointerEx
0x415038 SetFileValidData
0x415040 GetCurrentThreadId
0x415044 CreateFileW
0x415048 GetVersion
0x41504c GetProcAddress
0x415050 RtlUnwind
0x415054 RaiseException
0x415058 GetCommandLineA
0x41505c GetLastError
0x415060 HeapFree
0x415064 GetModuleHandleW
0x415068 TlsGetValue
0x41506c TlsAlloc
0x415070 TlsSetValue
0x415074 TlsFree
0x41507c SetLastError
0x415084 HeapAlloc
0x415088 TerminateProcess
0x41508c GetCurrentProcess
0x415098 IsDebuggerPresent
0x41509c Sleep
0x4150a0 ExitProcess
0x4150a4 WriteFile
0x4150a8 GetStdHandle
0x4150ac GetModuleFileNameA
0x4150bc WideCharToMultiByte
0x4150c4 SetHandleCount
0x4150c8 GetFileType
0x4150cc GetStartupInfoA
0x4150d4 HeapCreate
0x4150d8 VirtualFree
0x4150e0 GetTickCount
0x4150e4 GetCurrentProcessId
0x4150ec GetCPInfo
0x4150f0 GetACP
0x4150f4 GetOEMCP
0x4150f8 IsValidCodePage
0x415104 VirtualAlloc
0x415108 HeapReAlloc
0x41510c HeapSize
0x415110 LoadLibraryA
0x415118 LCMapStringA
0x41511c LCMapStringW
0x415120 GetStringTypeA
0x415124 GetStringTypeW
0x415128 GetLocaleInfoA
Library ADVAPI32.dll:
0x415000 DecryptFileW
Library VERSION.dll:
0x415130 VerInstallFileW
0x415134 GetFileVersionInfoW
0x415138 VerFindFileW

!This program cannot be run in DOS mode.
`.rdata
@.data
QQSVWd
0WWWWW
0WWWWW
_VVVVV
^WWWWW
HtHu4j
s[S;7|G;w
tR99u2
F\=hsA
0SSSSS
u&h0sA
>=Yt1j
j@j ^V
0A@@Ju
0SSSSS
_VVVVV
;t$,v-
UQPXY]Y[
URPQQh
0SSSSS
0SSSSS
t"SS9]
PPPPPPPP
PPPPPPPP
<+t(<-t$:
+t HHt
t+WWVPV
bad allocation
uempfqtnewkzossiwjxohzphzemtdlimusag
uempfqtnewkzossiwjxohzphzemtdlimusag
uempfqtnewkzossiwjxohzphzemtdlimusag
uempfqtnewkzossiwjxohzphzemtdlimusag
uempfqtnewkzossiwjxohzphzemtdlimusag
uempfqtnewkzossiwjxohzphzemtdlimusag
uempfqtnewkzossiwjxohzphzemtdlimusag
uevtxbelcxrjbkikkevqcri
eldeqtthdvkokwynnbnjmniyrvlanvjwfocdukxuklravjdluck
jmyvvchyzijiaykblrqtjvjriwhehbakpbyjwjtyoilfmsewsjkkdwbuedlzpxjkosgzamn
vbpqeauyswax
vqgpnimapziijxllmdyhvgjgodstivarnxkmvmqjkmtlireggzdhstjwmpxuksjevdx
atmzelhchwszbtwchkpzignadfagxeyaqghrlij
rrgkzmwkvesaomhojmvyvvhyaxjpmljliquaqkgdmvaz
zttkenkznfagavkxfewii
zttkenkznfagavkxfewii
zttkenkznfagavkxfewii
kbzfkffathdauijtsobtkkgj
pkpomutrzlsngoindxnalcebawxumkspllzeuipispldodfdaphgcrsbrqalvaeiqzbxkzajnnedfmhn
yiwedtsswddljwlsomdwmvpyiypbzkwkqwegsvjrjthxxrzvlpzmxinyovqshpfcbzkdxzznbqonnsorgpx
yiwedtsswddljwlsomdwmvpyiypbzkwkqwegsvjrjthxxrzvlpzmxinyovqshpfcbzkdxzznbqonnsorgpx
yiwedtsswddljwlsomdwmvpyiypbzkwkqwegsvjrjthxxrzvlpzmxinyovqshpfcbzkdxzznbqonnsorgpx
iusegacnagscirqfyz
fkueywcjlgqgjjvyqjmxtwdqbgcytqrnfnaimjwgyzvnntfwdpkknrlty
fkueywcjlgqgjjvyqjmxtwdqbgcytqrnfnaimjwgyzvnntfwdpkknrlty
fkueywcjlgqgjjvyqjmxtwdqbgcytqrnfnaimjwgyzvnntfwdpkknrlty
cooqrxfmmxdbgahwahkiyraodfhxmhefccebolachzsgzvaxvdigggklofpeetifnknussa
kqaeayishxispfzmmzclgshaidkjmbkcpptwebdwnfqouywtnjkdewwspsfaygbmilcgvhk
tcrogrtycdmynfssnmlcnbypzjclnvzeqroxedfodrzydylsnqw
kqaeayishxispfzmmzclgshaidkjmbkcpptwebdwnfqouywtnjkdewwspsfaygbmilcgvhk
kqaeayishxispfzmmzclgshaidkjmbkcpptwebdwnfqouywtnjkdewwspsfaygbmilcgvhk
ephwkurzkzdezgcjh
vajeprsjfojwexxvcrlfwzkcahhyhjhbpba
bgxksoyusjnqvxfetgpuggvwmejqquksnclmbixwynlkrzogfnhsvveok
vajeprsjfojwexxvcrlfwzkcahhyhjhbpba
vajeprsjfojwexxvcrlfwzkcahhyhjhbpba
vajeprsjfojwexxvcrlfwzkcahhyhjhbpba
vajeprsjfojwexxvcrlfwzkcahhyhjhbpba
dayqipzzmujyxqaijdrhocrxlpxqruihcqpetgkgmkaplmyccnigmmekzqfcylyzjfmobordpxqcvhfvp
oogcdkjsevznlvnkwesferjqfxplpjltflpcwyvjzwbmjwflpnbhhweaxoeeh
szbeiwdnrkytyocxfisspphkdhhkjfywpjmidmrgcvxhwhmiheakpafhkpvitlcojwdtxmrdebtqtzxhmudvtuj
urufitwroiafroygtxmqbktugisahrazyxkuijgoyzvsxnsrhepaxkkzuiejyjuerxsabnxkongiwslbrsavcwobjgpsa
gjtgqzutcluipmfslbsnfgesojepowdktmqeboqyehdn
zqesrmqoqlqy
uxmexxdqxsbbugmlvghvntflfrtdzxxngwxnrtzlkvawvnetjgsbrjyodmornodlhzaxrv
yvnzmuiyjqvjygarvtdgsclvllchsgexecemtplxerptpikjopqwntfkvieiihekpyyynonfsiqaumaqhbjimhdeimlwsrbac
bohzsovevyprkslseitqrcyrkaypdkyogsdgtwsdgzoayspubbdfyvdkaaxq
dhaoksqrjqs
hwtitltwitcznfzimtwesaibgaowbgbwixtbwjgxzww
ovywqhnurmsew
ezabslilujnlsjlmfmwggtnsgjj
prgnhattikkag
spgmjrjokmgrpytrspxoidnwvltsbfivsiojsrdubwqjhddeswyfanvsuqdeurjwmnojdasfyjmluuvd
mewaruknyoxrh
tlzvqxqyknnovgaozjdfddcujd
xfltjizdgzqizzwrlfozbdnmfijgoauhjcuyiufvizkzurbijybjqqrcgeopsbwtlujubxljsgu
rranwkxxgqdehspfjlgjwahrqhfpswfnuzgoviivhkvtuolglaeaiaornqxtmjpwdzgslvoeartwxmuj
xmoxrhviyqwegxlzxpasfoxvcdjxowhdzmullnyvkjvmdffnvljqlssmjocjkfellytctaxqzkidfhfhhqeobvgfv
vkipuxjzfrloexhfcioabvaufqugnmvh
yooobqefkebqgrftqjfrfsecinqrjhzdeinfuwedkskwsbyvkdfboewbqyqwbxewiuuumcrtbwkgmd
nexsflnzwalvbmtso
pmipshdjdmdwyeojdmjevfgojudtihoizwgrjdfhuvlgkqceqnzjfnzyefiohruzswvpanhnhcmqbzqg
VirtualProtect
kernel32.dll
DcfBxUoA6shgRWqKIFp8MR8J3ziCOqYANJru0NHaluOHDapzxuWe7QhN9dIvAz0SY
FP8cZKhobNQjG5pPomZeEIrQ4q3YGvbMP9h9bya4LrtVyoecrZEwnVQw8jOZZbxK1
gXmHOQtVpS0DQtsTk9EmoF3mVFrDzDmysVzDCQo0Ad3VAiH6FJIWXYdGmBkHku3Fq
]]1_A^.jZ]
"^|tL^
<\gQ>\%
mY]ME<]U
^Yu"]d
q\[t?^
]La]Z
,J\E1h\x2
JO]o;~^
]]`i"\9H
_E_<]|
^H0.],Q
J\A@D]
^uyO\&
^s;=]iG
_[$v\d
^Pj']>@
bad allocation
string too long
invalid string position
Unknown exception
GAIsProcessorFeaturePresent
KERNEL32
bad exception
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
CorExitProcess
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
1#QNAN
1#SNAN
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
GetProcAddress
GetModuleHandleA
MultiByteToWideChar
FreeConsole
SetSystemTimeAdjustment
SetFilePointer
DeleteAtom
AssignProcessToJobObject
AddAtomW
CreateMutexW
GetVersion
SetEndOfFile
SetFilePointerEx
GetFileInformationByHandle
SetFileValidData
IsProcessorFeaturePresent
GetCurrentThreadId
CreateFileW
KERNEL32.dll
DecryptFileW
ADVAPI32.dll
GetFileVersionInfoW
VerInstallFileW
VerFindFileW
VERSION.dll
RtlUnwind
RaiseException
GetCommandLineA
GetLastError
HeapFree
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
HeapSize
LoadLibraryA
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
z6s`y&c
2cVic6
j{ W$7
b`&W`}
Jz!ceu
h}D!ef
d`zy6}
or&WX}
8} 7jy
`y$f3~7
db&W8}
} ]ky
5xOJjy
l{FSZ
ly;NjS
c7g -C
Qf!Qw|
s8~f#Lb
Yz;oQ?
Yx&f*s"
iy>gnf0
df^Qaz
dfNQ#N
bEz-DQ
dfXQ`]
H1IeVcQ
df^Y\v
jynf'eD
1f#PVV
df^Yly
|Vm1y;
jy~~ST
o|ygST
ecTQCE
PK3Yjp
0gTgSTH
#~HWC(
S(IpqgS
{As\>^j
d{JuV7
l+QTq5q5
;mYB5}
jf9G=}
5pKh^7
jfxy5}
dyxH.{
jfx`5}
d{kM^7
dyXZ.{
jfXn5}
d{k?^7
GVkAmM
+1Vq(F
hy@gf{
ff2PU}
|2h#|
>}2h?s
6K<H6b
18w%qT
)gc6WLM
*jDg'?2<
.?AVbad_alloc@std@@
.?AVexception@std@@
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVout_of_range@std@@
.?AVtype_info@@
.?AVbad_exception@std@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DigiCert Inc1
www.digicert.com1$0"
DigiCert Assured ID Root CA0
220801000000Z
311109235959Z0b1
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
]J<0"0i3
v=Y]Bv
http://ocsp.digicert.com0C
7http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
4http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
~qj#k"
(f*^[0
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
220323000000Z
370322235959Z0c1
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
210429000000Z
360428235959Z0i1
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
[K]taM?
SA|X=G
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
jj@0HK4
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
220921000000Z
331121235959Z0F1
DigiCert1$0"
DigiCert Timestamp 2022 - 20
Ihttp://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
http://ocsp.digicert.com0X
Lhttp://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
220126000000Z
250226235959Z0e1
California1
Irvine1
Razer USA Ltd.1
Razer USA Ltd.0
Mhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Mhttp://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0>
http://www.digicert.com/CPS0
http://ocsp.digicert.com0\
Phttp://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
&\>(?Nu
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA
221121071827Z0/
q#N_:bk99nxz
ZVX7SL\1J
TMwgdnx~DW
Vbr9Q_4f~55MIbv
iCPVJT9Ww\Mw7MCq8vFe\sHVTRvuvote
rPO\Yk
zoCQ$P qSj.z
KERNEL32.DLL
mscoree.dll
((((( H
h(((( H
H
VS_VERSION_INFO
StringFileInfo
040904E4
Comments
Hiring quadrilles manipulative vastness quatrain attendees
CompanyName
Camera
FileDescription
Squelching pawnshops goahead morphisms macron streaking
FileVersion
5.245.140.7
InternalName
Wellordered dealings
LegalCopyright
Copyright
Chronicler butter
LegalTrademarks
Whereupon northward
OriginalFilename
Photocopies
ProductName
Jaunting drabness
ProductVersion
5.245.140.7
VarFileInfo
Translation
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.Convagent.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Doina.54749
CMC Clean
CAT-QuickHeal Backdoor.Convagent
ALYac Gen:Variant.Doina.54749
Malwarebytes Trojan.Crypt
Zillya Clean
Sangfor Clean
K7AntiVirus Trojan ( 0059fd251 )
BitDefender Gen:Variant.Doina.54749
K7GW Trojan ( 0059fd251 )
CrowdStrike win/malicious_confidence_100% (W)
Baidu Clean
VirIT Clean
Cyren W32/Convagent.CB.gen!Eldorado
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of Win32/Kryptik.HSYN
Cynet Malicious (score: 99)
APEX Malicious
Paloalto generic.ml
ClamAV Clean
Kaspersky HEUR:Trojan.Win32.Strab.gen
Alibaba Trojan:Win32/Strab.45cdd43f
NANO-Antivirus Clean
ViRobot Clean
Tencent Malware.Win32.Gencirc.10be8a39
TACHYON Clean
Sophos Mal/Generic-S
F-Secure Trojan.TR/AD.RedLineSteal.xuruc
DrWeb Clean
VIPRE Gen:Variant.Doina.54749
TrendMicro TrojanSpy.Win32.REDLINE.YXDC5Z
McAfee-GW-Edition Artemis!Trojan
Trapmine malicious.high.ml.score
FireEye Generic.mg.2f5769f336565444
Emsisoft Gen:Variant.Doina.54749 (B)
Ikarus Trojan.Win32.Crypt
GData Gen:Variant.Doina.54749
Jiangmin Clean
Webroot W32.Malware.Gen
Avira TR/AD.RedLineSteal.xuruc
Antiy-AVL Trojan/Win32.Kryptik
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Doina.DD5DD
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan.Win32.Strab.gen
Microsoft Trojan:Win32/Redline.RWZ!MTB
Google Detected
AhnLab-V3 Clean
Acronis Clean
McAfee Artemis!2F5769F33656
MAX malware (ai score=84)
DeepInstinct MALICIOUS
VBA32 BScope.Trojan.Kryptik
Cylance unsafe
Panda Trj/Passtealer.R
Zoner Clean
TrendMicro-HouseCall TrojanSpy.Win32.REDLINE.YXDC5Z
Rising Backdoor.Convagent!8.123DC (TFE:5:vbhNhfFnk7U)
Yandex Clean
SentinelOne Static AI - Suspicious PE
MaxSecure Trojan.W32.Strab.gen_260344
Fortinet W32/Kryptik.HSYN!tr
BitDefenderTheta Clean
AVG Win32:CrypterX-gen [Trj]
Avast Win32:CrypterX-gen [Trj]
No IRMA results available.