Static | ZeroBOX

PE Compile Time

2023-08-11 14:40:41

PE Imphash

4ecd752f2d70ad77939724fa31d997d9

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00007c25 0x00007e00 6.28669792862
.rdata 0x00009000 0x00002d0e 0x00002e00 4.64378728778
.data 0x0000c000 0x00003568 0x00001400 1.79649862728
.pdata 0x00010000 0x000007a4 0x00000800 4.29165192687
.rsrc 0x00011000 0x000001b4 0x00000200 5.10500609928
.reloc 0x00012000 0x000002be 0x00000400 2.51203114159

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x00011058 0x0000015a LANG_ENGLISH SUBLANG_ENGLISH_US ASCII text, with CRLF line terminators

Imports

Library KERNEL32.dll:
0x140009000 VirtualFree
0x140009008 CopyFileW
0x140009010 GetModuleFileNameW
0x140009018 VirtualAlloc
0x140009020 CreateFileW
0x140009028 SetStdHandle
0x140009030 WriteConsoleW
0x140009038 CloseHandle
0x140009040 SetFilePointer
0x140009048 GetStringTypeW
0x140009050 MultiByteToWideChar
0x140009058 LCMapStringW
0x140009060 GetLastError
0x140009068 HeapFree
0x140009070 HeapAlloc
0x140009078 GetProcAddress
0x140009080 GetModuleHandleW
0x140009088 ExitProcess
0x140009090 DecodePointer
0x140009098 GetCommandLineA
0x1400090a0 TerminateProcess
0x1400090a8 GetCurrentProcess
0x1400090b0 UnhandledExceptionFilter
0x1400090c0 IsDebuggerPresent
0x1400090c8 RtlVirtualUnwind
0x1400090d0 RtlLookupFunctionEntry
0x1400090d8 RtlCaptureContext
0x1400090e0 HeapSetInformation
0x1400090e8 GetVersion
0x1400090f0 HeapCreate
0x1400090f8 WriteFile
0x140009100 GetStdHandle
0x140009108 EncodePointer
0x140009110 RtlUnwindEx
0x140009118 EnterCriticalSection
0x140009120 LeaveCriticalSection
0x140009130 DeleteCriticalSection
0x140009138 LoadLibraryW
0x140009140 FlsGetValue
0x140009148 FlsSetValue
0x140009150 FlsFree
0x140009158 SetLastError
0x140009160 GetCurrentThreadId
0x140009168 FlsAlloc
0x140009170 GetModuleFileNameA
0x140009178 FreeEnvironmentStringsW
0x140009180 WideCharToMultiByte
0x140009188 GetEnvironmentStringsW
0x140009190 SetHandleCount
0x140009198 GetFileType
0x1400091a0 GetStartupInfoW
0x1400091a8 QueryPerformanceCounter
0x1400091b0 GetTickCount
0x1400091b8 GetCurrentProcessId
0x1400091c0 GetSystemTimeAsFileTime
0x1400091c8 Sleep
0x1400091d0 GetCPInfo
0x1400091d8 GetACP
0x1400091e0 GetOEMCP
0x1400091e8 IsValidCodePage
0x1400091f0 HeapSize
0x1400091f8 HeapReAlloc
0x140009200 GetConsoleCP
0x140009208 GetConsoleMode
0x140009210 FlushFileBuffers
Library SHELL32.dll:
0x140009220 ShellExecuteW
Library WININET.dll:
0x140009250 InternetOpenUrlA
0x140009258 InternetCloseHandle
0x140009260 InternetOpenA
0x140009268 InternetReadFile
Library SHLWAPI.dll:
0x140009230 PathFindFileNameW
0x140009238 PathFileExistsW
0x140009240 PathCombineW

!This program cannot be run in DOS mode.
`.rdata
@.data
.pdata
@.rsrc
@.reloc
WATAUAVAWH
@A_A^A]A\_
t$ WATAUH
WATAUAVAWH
A_A^A]A\_
UVWATAUAVAWH
D$DD9T$\
t$hD+d$DD+
9D$Pti
A_A^A]A\_^]
WATAUAVAWH
0A_A^A]A\_
ATAUAVH
A^A]A\
LcA<E3
x ATAUAVH
A^A]A\
Hct$@H
s\HcL$HH
ATAUAVH
fD9t$b
A^A]A\
@SUVWATAUAVH
PA^A]A\_^][
ATAUAWH
0A_A]A\
UVWATAUH
D$&8\$&t-8X
@A]A\_^]
L$ UVWH
fffffff
fffffff
\$ UVWATAUAVAWH
!|$DHc
|$DD9d$X
f;D$@ug
f;D$@uD
H!\$ H
HcD$HH;
H!\$ H
HcD$HH;
H!|$ L
A_A^A]A\_^]
VWATAUAVH
A^A]A\_^
@UATAUAVAWH
!t$(H!t$ A
A_A^A]A\]
@UATAUAVAWH
A_A^A]A\]
VWATAUAVH
A^A]A\_^
D8"u%H
CorExitProcess
(null)
`h````
xpxxxx
GetProcessWindowStation
GetUserObjectInformationW
GetLastActivePopup
GetActiveWindow
MessageBoxW
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
`h`hhh
xppwpp
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
Downloader
https://yts2023811.oss-cn-hangzhou.aliyuncs.com/3.bin
VirtualFree
CopyFileW
GetModuleFileNameW
VirtualAlloc
KERNEL32.dll
ShellExecuteW
SHELL32.dll
InternetOpenUrlA
InternetReadFile
InternetOpenA
InternetCloseHandle
WININET.dll
PathFindFileNameW
PathFileExistsW
PathCombineW
SHLWAPI.dll
GetLastError
HeapFree
HeapAlloc
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
HeapSetInformation
GetVersion
HeapCreate
WriteFile
GetStdHandle
EncodePointer
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadLibraryW
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
mscoree.dll
runtime error
TLOSS error
SING error
DOMAIN error
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
- abort() has been called
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
(null)
USER32.DLL
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
((((( H
h(((( H
H
CONOUT$
C:\Users\Public\
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.Agent.Y!c
tehtris Clean
MicroWorld-eScan Clean
FireEye Clean
CAT-QuickHeal Clean
ALYac Clean
Malwarebytes Generic.Malware/Suspicious
VIPRE Clean
Sangfor Downloader.Win32.Agent.Vy0i
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
Cybereason malicious.630909
Baidu Clean
VirIT Clean
Cyren Clean
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win64/TrojanDownloader.Agent_AGen.DC
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky Trojan-Downloader.Win32.Agent.xyaytd
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Downloader.Agent!8.B23 (TFE:5:VthFwSSuMeK)
Emsisoft Clean
F-Secure Clean
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win64.NetLoader.qm
Trapmine Clean
CMC Clean
Sophos Mal/Generic-S
Ikarus Win32.Outbreak
GData Clean
Jiangmin Clean
Webroot Clean
Google Clean
Avira Clean
MAX Clean
Antiy-AVL GrayWare/Win32.Wacapew
Gridinsoft Clean
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Trojan-Downloader.Win32.Agent.xyaytd
Microsoft Trojan:Win32/Casdet!rfn
Cynet Clean
AhnLab-V3 Clean
Acronis Clean
McAfee RDN/Generic Downloader.x
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Clean
Cylance unsafe
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002H0DHB23
Tencent Win64.Trojan-Downloader.Oader.Hflw
Yandex Clean
SentinelOne Static AI - Suspicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet W64/Agent_AGen.DC!tr.dldr
BitDefenderTheta Clean
AVG FileRepMalware [Misc]
Avast FileRepMalware [Misc]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.