Static | ZeroBOX

PE Compile Time

2019-07-02 19:11:09

PDB Path

C:\JobRelease\tools\msix-psf\Win32\Release\PsfRunDll32.pdb

PE Imphash

c53787f039f9c23a754046adc2fd2ddf

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000b53f 0x0000b600 6.6307790477
.rdata 0x0000d000 0x00005886 0x00005a00 4.83275827062
.data 0x00013000 0x000012ac 0x00000a00 1.8058325631
.rsrc 0x00015000 0x000001e0 0x00000200 4.70468074304
.reloc 0x00016000 0x00000db0 0x00000e00 6.43725927816

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x00015060 0x0000017d LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library KERNEL32.dll:
0x40d000 GetLastError
0x40d004 LoadLibraryA
0x40d008 GetProcAddress
0x40d00c WriteConsoleW
0x40d018 GetCurrentProcess
0x40d01c TerminateProcess
0x40d028 GetCurrentProcessId
0x40d02c GetCurrentThreadId
0x40d034 InitializeSListHead
0x40d038 IsDebuggerPresent
0x40d03c GetStartupInfoW
0x40d040 GetModuleHandleW
0x40d044 RtlUnwind
0x40d048 SetLastError
0x40d05c TlsAlloc
0x40d060 TlsGetValue
0x40d064 TlsSetValue
0x40d068 TlsFree
0x40d06c FreeLibrary
0x40d070 LoadLibraryExW
0x40d074 RaiseException
0x40d078 GetStdHandle
0x40d07c WriteFile
0x40d080 GetModuleFileNameW
0x40d084 ExitProcess
0x40d088 GetModuleHandleExW
0x40d08c HeapAlloc
0x40d090 HeapFree
0x40d094 FindClose
0x40d098 FindFirstFileExW
0x40d09c FindNextFileW
0x40d0a0 IsValidCodePage
0x40d0a4 GetACP
0x40d0a8 GetOEMCP
0x40d0ac GetCPInfo
0x40d0b0 GetCommandLineA
0x40d0b4 GetCommandLineW
0x40d0b8 MultiByteToWideChar
0x40d0bc WideCharToMultiByte
0x40d0c8 SetStdHandle
0x40d0cc GetFileType
0x40d0d0 GetStringTypeW
0x40d0d4 LCMapStringW
0x40d0d8 GetProcessHeap
0x40d0dc HeapSize
0x40d0e0 HeapReAlloc
0x40d0e4 FlushFileBuffers
0x40d0e8 GetConsoleCP
0x40d0ec GetConsoleMode
0x40d0f0 SetFilePointerEx
0x40d0f4 CreateFileW
0x40d0f8 CloseHandle
0x40d0fc DecodePointer

!This program cannot be run in DOS mode.
`.rdata
@.data
@.reloc
URPQQh
;t$,v-
UQPXY]Y[
zSSSSj
SSVWh
f9:t!V
QQSVj8j@
xg;5pAA
tl=H6A
35\BA
35hBA
j$hX!A
PPPPPPPP
PPPPPWS
PP9E u<PPVWP
xE;5pAA
xE;5pAA
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__swift_1
__swift_2
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
operator co_await
operator<=>
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
FlsAlloc
FlsFree
FlsSetValue
InitializeCriticalSectionEx
CorExitProcess
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
AreFileApisANSI
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
LCMapStringEx
LocaleNameToLCID
AppPolicyGetProcessTerminationMethod
?5Wg4p
%S#[k=
"B <1=
_hypot
_nextafter
RSDScs4 U
C:\JobRelease\tools\msix-psf\Win32\Release\PsfRunDll32.pdb
.text$mn
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$sxdata
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.rsrc$01
.rsrc$02
GetLastError
LoadLibraryA
GetProcAddress
KERNEL32.dll
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetStringTypeW
LCMapStringW
GetProcessHeap
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
CreateFileW
CloseHandle
WriteConsoleW
DecodePointer
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
3&31383X3^3d3j3p3v3}3
5 575=5C5I5O5U5[5p5
6#6K6]6
7.747_7e7
9@:N:i:t:
;U;i;p;
>7>?>Q>^>
1212;2I2d2u2
4B4Y4g4s4
5(5-525M5Z5c5h5m5
8+9094989<9
707>7J7]7d7l7
>'>.>:>R>W>c>h>|>C?J?\?p?x?
5)5b5y5
6Y7d7N8<9F9S9
:':.:c:<;l;
?-?B?T?a?z?
060=0^0
1"171A1d1n1
6i7G8n8
=#=-=:=D=T=
0-0m0y0
1!1%1+1/191L1U1p1
2'3P4U4[4`4
5@6R6k6
8 8.8K8S8|8
9:::v:
<)<;<M<_<q<
<F>L>o>8?
1 2Y2p2
3#3(383=3B3R3W3\3
5"5'5B5L5\5a5f5
6!6&6G6W6
6&787D7
7#8[8y8
:=;F;^;
?7?R?_?m?{?
1M4*515
404;4I4
5(5:5D5h5
:#;D;K;b;x;
;!<5<Z<e<u<
=0=B=Z?d?
3'343d3
4@5F5K5R5b5p5
7D7N7i7
8!8)81898W8_8
0,0=0E0U0f0
0!101<1K1^1}1
2'2R2t2
1 1$1(14181<1P1T1X1\1`1d1h1l1p1t1x1|1
2 2$2(2,2024282<2@2D2H2L2P2T2X2\2`2d2h2l2p2t2x2|2
; ;,;4;<;@;D;H;L;
3 3$3(3,3034383<3@3D3H3L3P3T3X3\3`3l3p3t3x3|3
>$>,>4><>D>L>T>\>d>l>t>|>
?$?,?4?<?D?L?T?\?d?l?t?|?
0$0,040<0D0L0T0\0d0l0t0|0
1$1,141<1D1L1T1\1d1l1t1|1
2$2,242<2D2L2T2\2d2l2t2|2
3$3,343<3D3L3T3\3d3l3t3|3
4$4,444<4D4L4T4\4d4l4t4|4
? ?(?0?8?@?H?P?X?`?h?p?x?
0 0(00080@0H0P0X0`0h0p0x0
1 1(10181@1H1P1X1`1h1p1x1
2 2(20282@2H2P2X2`2h2p2x2
3 3(30383@3H3P3X3`3h3p3x3
4 4(40484@4H4P4X4`4h4p4x4
5 5(50585@5H5P5X5`5h5p5x5
9$9,949<9D9L9T9\9d9l9t9|9
9l;p;x;
?,?0?L?P?l?p?
000P0p0
101P1p1
202L2P2p2
1H6L6P6T6X6\6`6d6h6l6x6|6
thawte, Inc.1(0&
Certification Services Division1806
/(c) 2006 thawte, Inc. - For authorized use only10
thawte Primary Root CA0
131210000000Z
231209235959Z0L1
thawte, Inc.1&0$
thawte SHA256 Code Signing CA0
http://t2.symcb.com0
!http://t1.symcb.com/ThawtePCA.crl0
SymantecPKI-1-5680
UwM^6)
thawte, Inc.1&0$
thawte SHA256 Code Signing CA0
170224000000Z
200224235959Z0
Bucuresti1
Caphyon SRL1'0%
SECURE APPLICATION DEVELOPMENT1
Caphyon SRL0
http://tl.symcb.com/tl.crl0
https://www.thawte.com/cps0/
!https://www.thawte.com/repository0W
http://tl.symcd.com0&
http://tl.symcb.com/tl.crt0
thawte, Inc.1&0$
thawte SHA256 Code Signing CA
"https://www.advancedinstaller.com 0
_0_=F2
20190702101450Z0
Symantec Corporation10
Symantec Trust Network110/
(Symantec SHA256 TimeStamping Signer - G3
VeriSign, Inc.10
VeriSign Trust Network1:08
1(c) 2008 VeriSign, Inc. - For authorized use only1806
/VeriSign Universal Root Certification Authority0
160112000000Z
310111235959Z0w1
Symantec Corporation10
Symantec Trust Network1(0&
Symantec SHA256 TimeStamping CA0
https://d.symcb.com/cps0%
https://d.symcb.com/rpa0.
http://s.symcd.com06
%http://s.symcb.com/universal-root.crl0
TimeStamp-2048-30
Symantec Corporation10
Symantec Trust Network1(0&
Symantec SHA256 TimeStamping CA0
171223000000Z
290322235959Z0
Symantec Corporation10
Symantec Trust Network110/
(Symantec SHA256 TimeStamping Signer - G30
?'J3Nm
https://d.symcb.com/cps0%
https://d.symcb.com/rpa0@
/http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
http://ts-ocsp.ws.symantec.com0;
/http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
TimeStamp-2048-60
U){9FN
Symantec Corporation10
Symantec Trust Network1(0&
Symantec SHA256 TimeStamping CA
190702101450Z0/
/1(0&0$0"
@api-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
api-ms-
mscoree.dll
((((( H
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
@ja-JP
@api-ms-win-core-datetime-l1-1-1
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-file-l1-2-2
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-synch-l1-2-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
advapi32
kernel32
api-ms-win-appmodel-runtime-l1-1-2
user32
api-ms-
ext-ms-
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
CONOUT$
$Advanced Installe
Antivirus Signature
Bkav Clean
Lionic Clean
tehtris Clean
MicroWorld-eScan Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
McAfee Clean
Malwarebytes Clean
Zillya Clean
Sangfor Clean
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
CrowdStrike Clean
BitDefenderTheta Clean
VirIT Clean
Cyren Clean
Symantec Clean
Elastic Clean
ESET-NOD32 Clean
APEX Clean
Paloalto Clean
Cynet Clean
Kaspersky Clean
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Clean
TACHYON Clean
Sophos Clean
Baidu Clean
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition Clean
Trapmine Clean
FireEye Clean
Emsisoft Clean
SentinelOne Clean
GData Clean
Jiangmin Clean
Webroot Clean
Avira Clean
Antiy-AVL Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Clean
Google Clean
AhnLab-V3 Clean
Acronis Clean
VBA32 Clean
ALYac Clean
MAX Clean
DeepInstinct Clean
Cylance Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
Ikarus Clean
MaxSecure Clean
Fortinet Clean
AVG Clean
Avast Clean
No IRMA results available.