Static | ZeroBOX

PE Compile Time

2023-07-20 03:45:50

PDB Path

C:\Users\Administrator\Desktop\Espio-main\loader\x64\Release\Espio.pdb

PE Imphash

341ef3eec107cf8949a849080b1bfce0

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000024fa 0x00002600 6.08029816444
.rdata 0x00004000 0x00001c26 0x00001e00 4.15131492121
.data 0x00006000 0x00000760 0x00000200 2.02282676972
.pdata 0x00007000 0x000002d0 0x00000400 3.03216302466
.rsrc 0x00008000 0x00069df0 0x00069e00 4.72300036363
.reloc 0x00072000 0x00000054 0x00000200 1.18201561554

Resources

Name Offset Size Language Sub-language File type
KEY 0x00071bd8 0x00000091 LANG_ENGLISH SUBLANG_ENGLISH_US ASCII text, with no line terminators
OBFUSCATEDPAYLOAD 0x00008120 0x00069ab8 LANG_ENGLISH SUBLANG_ENGLISH_US ASCII text, with very long lines, with no line terminators
RT_MANIFEST 0x00071c70 0x0000017d LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library KERNEL32.dll:
0x140004000 SizeofResource
0x140004008 GetCurrentProcess
0x140004010 FreeResource
0x140004018 LockResource
0x140004020 LoadLibraryW
0x140004028 LoadResource
0x140004030 FindResourceW
0x140004038 FreeLibrary
0x140004040 GetConsoleWindow
0x140004048 VirtualProtect
0x140004050 CreateFileA
0x140004058 CloseHandle
0x140004060 K32GetModuleInformation
0x140004068 GetProcAddress
0x140004070 CreateFileMappingW
0x140004078 MapViewOfFile
0x140004080 RtlLookupFunctionEntry
0x140004088 RtlVirtualUnwind
0x140004090 UnhandledExceptionFilter
0x1400040a0 TerminateProcess
0x1400040b0 IsDebuggerPresent
0x1400040b8 GetModuleHandleW
0x1400040c0 RtlCaptureContext
0x1400040c8 QueryPerformanceCounter
0x1400040d0 GetCurrentProcessId
0x1400040d8 GetCurrentThreadId
0x1400040e0 GetSystemTimeAsFileTime
0x1400040e8 InitializeSListHead
Library USER32.dll:
0x140004118 ShowWindow
Library MSVCP140.dll:
Library VCRUNTIME140_1.dll:
0x140004180 __CxxFrameHandler4
Library VCRUNTIME140.dll:
0x140004128 _CxxThrowException
0x140004130 memcpy
0x140004138 __current_exception
0x140004148 memchr
0x140004150 __C_specific_handler
0x140004158 memmove
0x140004160 __std_exception_destroy
0x140004168 memset
0x140004170 __std_exception_copy
Library api-ms-win-crt-string-l1-1-0.dll:
0x1400042a8 isalnum
Library api-ms-win-crt-runtime-l1-1-0.dll:
0x1400041f0 _exit
0x1400041f8 _initterm_e
0x140004200 _c_exit
0x140004218 __p___argv
0x140004220 __p___argc
0x140004228 exit
0x140004230 _initterm
0x140004238 _crt_atexit
0x140004250 _configure_narrow_argv
0x140004258 _set_app_type
0x140004260 _seh_filter_exe
0x140004268 _cexit
0x140004270 terminate
0x140004278 _errno
0x140004280 _initialize_onexit_table
Library api-ms-win-crt-convert-l1-1-0.dll:
0x140004190 strtol
Library api-ms-win-crt-heap-l1-1-0.dll:
0x1400041a0 free
0x1400041a8 _callnewh
0x1400041b0 _set_new_mode
0x1400041b8 malloc
Library api-ms-win-crt-math-l1-1-0.dll:
0x1400041d8 __setusermatherr
Library api-ms-win-crt-stdio-l1-1-0.dll:
0x140004290 _set_fmode
0x140004298 __p__commode
Library api-ms-win-crt-locale-l1-1-0.dll:
0x1400041c8 _configthreadlocale

!This program cannot be run in DOS mode.
K@Rich
`.rdata
@.data
.pdata
@.rsrc
@.reloc
UVWATAUAVAWH
`A_A^A]A\_^]
@SVWAVAWH
A_A^_^[
A_A^_^[
@SUVAWH
(A_^][
UATAUAVAWH
A_A^A]A\]
|$ UATAUAVAWH
A_A^A]A\]
u0HcH<H
H3E H3E
bad allocation
Unknown exception
bad array new length
string too long
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
invalid stol argument
stol argument out of range
C:\windows\system32\ntdll.dll
NtCreateSection
NtMapViewOfSection
NtUnmapViewOfSection
NtWriteVirtualMemory
RtlInitUnicodeString
RtlCreateProcessParameters
RtlCreateUserProcess
RtlCreateUserThread
NtWaitForSingleObject
NtClose
C:\Users\Administrator\Desktop\Espio-main\loader\x64\Release\Espio.pdb
.text$di
.text$mn
.text$mn$00
.text$x
.text$yd
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCU
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIZ
.CRT$XPA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$r
.rdata$voltmd
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.data$r
.data$rs
.pdata
.rsrc$01
.rsrc$02
SizeofResource
GetCurrentProcess
FreeResource
LockResource
LoadLibraryW
LoadResource
FindResourceW
FreeLibrary
GetConsoleWindow
VirtualProtect
CreateFileA
CloseHandle
K32GetModuleInformation
GetProcAddress
CreateFileMappingW
MapViewOfFile
KERNEL32.dll
ShowWindow
USER32.dll
?_Xlength_error@std@@YAXPEBD@Z
?_Xinvalid_argument@std@@YAXPEBD@Z
?_Xout_of_range@std@@YAXPEBD@Z
MSVCP140.dll
__CxxFrameHandler4
__std_exception_destroy
__std_exception_copy
__C_specific_handler
_CxxThrowException
__current_exception
__current_exception_context
memset
VCRUNTIME140_1.dll
VCRUNTIME140.dll
isalnum
_invalid_parameter_noinfo_noreturn
_errno
strtol
malloc
_callnewh
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_cexit
_seh_filter_exe
_set_app_type
__setusermatherr
_get_initial_narrow_environment
_initterm
_initterm_e
_set_fmode
__p___argc
__p___argv
_c_exit
_register_thread_local_exe_atexit_callback
_configthreadlocale
_set_new_mode
__p__commode
terminate
api-ms-win-crt-string-l1-1-0.dll
api-ms-win-crt-runtime-l1-1-0.dll
api-ms-win-crt-convert-l1-1-0.dll
api-ms-win-crt-heap-l1-1-0.dll
api-ms-win-crt-math-l1-1-0.dll
api-ms-win-crt-stdio-l1-1-0.dll
api-ms-win-crt-locale-l1-1-0.dll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
memchr
memcpy
memmove
.?AVbad_alloc@std@@
.?AVexception@std@@
.?AVbad_array_new_length@std@@
.?AVtype_info@@
MHhiYzB4YzUweDkzMHgzYjB4MzAweGNhMHhmMDB4MzYweDY1MHhiMzB4YTkweGQ3MHg5NDB4Y2UweDlmMHhlODB4NmQweDliMHhlZDB4OWIweGUyMHgxMTB4ZTEweDg0MHhhODB4OTQweDY1MHg1MTB4OTgweDBjMHg5YTB4MmQweGFhMHg0ZDB4YTgweGI2MHgzZjB4YmYweGQzMHg1NTB4MTEweDNjMHg1ZTB4NTgweDU0MHgzNzB4N2QweDhkMHhiNDB4ODYweDkzMHhjYTB4ZjEweDVlMHhhODB4NTEweDUzMHg5ZDB4MDMweGQ3MHgzMjB4Y2MweDE4MHg2MzB4ZGYweGM3MHg1NjB4MWIweGIzMHgxYzB4NGQweGVlMHg3NzB4MDMweGU5MHhjZDB4YjMweDEyMHhmYTB4YTAweDZlMHg5NDB4ZWQweDkwMHgwNzB4ODkweGNiMHg4MTB4Y2IweDBlMHhlNzB4M2MweGMwMHhlNzB4NzcweDI2MHg0ODB4MDIweGI5MHhhNDB4MjcweDRhMHgwMTB4MTQweDUwMHg2NjB4YWQweDBhMHg4ODB4ODgweDY4MHhhYzB4ZmIweDNiMHg3YjB4ODkweGJjMHg3YzB4NWYweDA3MHhmOTB4ZWYweDMyMHhjNTB4Y2YweDhhMHhmYjB4OWIweGMzMHg4MjB4MTIweDcxMHgwNDB4ODkweGRjMHgzODB4MjkweDU2MHg2NjB4NzgweDI2MHhkZTB4OTcweGUyMHg0MDB4NGYweDc1MHhmYzB4MDcweDY0MHhmNTB4MmUweGE3MHg2MTB4NmEweGJiMHg5YzB4MWIweDZkMHg2NzB4NjEweDQxMHhhYjB4ZWEweDlkMHgyYjB4ZDEweDMwMHgyODB4OWMweGNjMHhmNDB4MDQweGY1MHgyOTB4YmMweGE2MHgwNjB4M2EweDQ4MHgzMzB4MjcweGVjMHg3YzB4MmUweGUxMHg0ODB4YzAweGNmMHg4NjB4MzEweDlk
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
ntdll.dll
\??\C:\Windows\System32\werfault.exe
obfuscatedPayload
OBFUSCATEDPAYLOAD
Antivirus Signature
Bkav Clean
Lionic Trojan.Win64.Donut.tsnU
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Tedy.293468
CMC Clean
CAT-QuickHeal Clean
ALYac Gen:Variant.Tedy.293468
Malwarebytes Trojan.MalPack
VIPRE Gen:Variant.Tedy.293468
Sangfor Trojan.Win64.Agent.Vooy
K7AntiVirus Clean
BitDefender Gen:Variant.Tedy.293468
K7GW Clean
Cybereason Clean
Arcabit Trojan.Tedy.D47A5C
BitDefenderTheta Clean
VirIT Clean
Cyren Clean
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of Win64/Kryptik.DKU
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky UDS:DangerousObject.Multi.Generic
Alibaba Trojan:Win64/Kryptik.dff42223
NANO-Antivirus Clean
SUPERAntiSpyware Clean
Rising HackTool.Meterpreter!8.2F21 (TFE:5:YYnVYocbihB)
TACHYON Clean
Sophos Mal/Generic-S
Baidu Clean
F-Secure Clean
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win64.Infected.gt
Trapmine Clean
FireEye Gen:Variant.Tedy.293468
Emsisoft Gen:Variant.Tedy.293468 (B)
Ikarus Win32.Outbreak
Jiangmin Trojan.Shelm.ip
Webroot Clean
Google Detected
Avira Clean
Antiy-AVL Trojan/Win64.Kryptik
Gridinsoft Trojan.Win64.Kryptik.oa!s1
Xcitium Clean
Microsoft Trojan:Win32/Wacatac.B!ml
ViRobot Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
GData Gen:Variant.Tedy.293468
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.Generic.C5309372
Acronis Clean
McAfee GenericRXAA-AA!103746E75CC7
MAX malware (ai score=82)
DeepInstinct MALICIOUS
VBA32 Clean
Cylance unsafe
Panda Clean
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R014H0CGM23
Tencent Malware.Win32.Gencirc.10be7231
Yandex Clean
SentinelOne Clean
MaxSecure Trojan.Malware.300983.susgen
Fortinet Clean
AVG Win64:Evo-gen [Trj]
Avast Win64:Evo-gen [Trj]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.