Static | ZeroBOX

PE Compile Time

2023-12-21 19:04:38

PE Imphash

057c392adf7e60f53994e6bacf1e292a

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00001904 0x00001a00 5.64325471519
.rdata 0x00003000 0x00000ecc 0x00001000 4.55501520398
.data 0x00004000 0x00000818 0x00000600 2.56123392669
.rsrc 0x00005000 0x000002b0 0x00000400 5.1876721105
.reloc 0x00006000 0x00000456 0x00000600 5.06373019969

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x00005058 0x00000256 LANG_ENGLISH SUBLANG_ENGLISH_US ASCII text, with CRLF line terminators

Imports

Library MSVCR90.dll:
0x403088 _adjust_fdiv
0x40308c _controlfp_s
0x403090 _invoke_watson
0x403098 _decode_pointer
0x40309c _onexit
0x4030a0 _lock
0x4030a4 __dllonexit
0x4030a8 _unlock
0x4030ac ?terminate@@YAXXZ
0x4030b0 rand
0x4030b4 _crt_debugger_hook
0x4030b8 __set_app_type
0x4030bc _encode_pointer
0x4030c0 __p__fmode
0x4030c4 __p__commode
0x4030c8 memset
0x4030cc __setusermatherr
0x4030d0 _configthreadlocale
0x4030d4 _initterm_e
0x4030d8 _initterm
0x4030dc _acmdln
0x4030e0 exit
0x4030e4 _ismbblead
0x4030e8 _XcptFilter
0x4030ec _exit
0x4030f0 _cexit
0x4030f4 __getmainargs
0x4030f8 _amsg_exit
0x4030fc wcscmp
0x403100 wcslen
0x403104 srand
Library urlmon.dll:
0x403158 URLDownloadToFileW
Library WININET.dll:
0x403138 HttpQueryInfoA
0x40313c InternetOpenUrlW
0x403140 InternetOpenW
0x403144 InternetOpenA
0x403148 InternetOpenUrlA
0x40314c InternetCloseHandle
0x403150 InternetReadFile
Library SHLWAPI.dll:
0x403114 PathFileExistsA
0x403118 PathFileExistsW
0x40311c PathFindFileNameW
Library KERNEL32.dll:
0x403010 InterlockedExchange
0x403014 MoveFileA
0x403018 MoveFileW
0x40301c DeleteFileA
0x403020 CreateMutexA
0x403024 GetLastError
0x403028 ExitProcess
0x40302c GetModuleFileNameW
0x403030 CopyFileW
0x403034 SetFileAttributesW
0x403038 GetTickCount
0x403044 WriteFile
0x403048 CloseHandle
0x40304c DeleteFileW
0x403050 CreateProcessW
0x403054 Sleep
0x403060 IsDebuggerPresent
0x403068 GetCurrentThreadId
0x40306c GetCurrentProcessId
0x403074 GetStartupInfoA
0x403078 TerminateProcess
0x40307c CreateFileW
0x403080 GetCurrentProcess
Library USER32.dll:
0x403124 FindWindowA
0x403128 SetForegroundWindow
0x40312c ShowWindow
0x403130 wsprintfW
Library ADVAPI32.dll:
0x403000 RegSetValueExW
0x403004 RegCloseKey
0x403008 RegOpenKeyExW
Library SHELL32.dll:
0x40310c ShellExecuteW

!This program cannot be run in DOS mode.
Richce
`.rdata
@.data
@.reloc
tsh$@@
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36
http://193.3.19.247/Installed
PreLoad
memset
wcslen
wcscmp
MSVCR90.dll
_amsg_exit
__getmainargs
_cexit
_XcptFilter
_ismbblead
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
URLDownloadToFileW
urlmon.dll
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
HttpQueryInfoA
InternetOpenUrlW
InternetOpenW
InternetReadFile
WININET.dll
PathFileExistsW
PathFindFileNameW
PathFileExistsA
SHLWAPI.dll
CreateProcessW
DeleteFileW
CloseHandle
WriteFile
CreateFileW
ExpandEnvironmentStringsW
GetTickCount
SetFileAttributesW
CopyFileW
GetModuleFileNameW
ExitProcess
GetLastError
CreateMutexA
DeleteFileA
MoveFileW
MoveFileA
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
KERNEL32.dll
wsprintfW
SetForegroundWindow
ShowWindow
FindWindowA
USER32.dll
RegCloseKey
RegSetValueExW
RegOpenKeyExW
ADVAPI32.dll
ShellExecuteW
SHELL32.dll
freeukraine
http://putinsucks.ua/
arhf8ahr8rhfh8rhf8
2dgd828d8g8fg8g8g
feu8gf8g2gf8g2fg
aefafugaugfgauegf
aefyaiegfayegfg
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
<dependency>
<dependentAssembly>
<assemblyIdentity type="win32" name="Microsoft.VC90.CRT" version="9.0.21022.8" processorArchitecture="x86" publicKeyToken="1fc8b3b9a1e18e3b"></assemblyIdentity>
</dependentAssembly>
</dependency>
</assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDING
0+050C0M0X0b0
13191X1
2?2L2\2b2
2!30383D3Q3a3l3
4@4M4]4
5:5L5y5
5+61666;6A6L6Q6W6\6a6g6l6q6w6
77%7*7/757@7E7K7V7[7a7n7{7
8$8/8>8K8P8U8[8
9 9%9+989E9Y9^9d9i9o9t9z9
:":B:O:c:h:n:y:~:
;0;5;;;@;E;K;V;a;w;};
<(<7<B<G<L<R<W<]<h<m<s<x<~<
=*=5=A=M=X=e=v=
>G>M>`>m>
?(?9???R?_?x?
0Z0v0|0
1#1-1G1Q1d1n1s1x1
1$2.242>2W2
2.343<3C3H3N3T3\3b3i3p3
4"4*464?4D4J4T4]4h4t4y4
5"5(5<5Q5\5t5
7A8d8q8}8
d1p1t1H6L6
@jjjjh
@jjjjh
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36
%temp%
%s\%d%d.exe
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
%s:Zone.Identifier
%s\%d%d.exe
%s:Zone.Identifier
%temp%
%s\2535235.jpg
dwinsvc.exe
Windows Service
http://193.3.19.247/pl.exe
%s:Zone.Identifier
%windir%
Software\Microsoft\Windows\CurrentVersion\Run\
%userprofile%
Software\Microsoft\Windows\CurrentVersion\Run\
gargarhrharharfafrahth
4yy4w4yw4fwgwgw
argarhargafafargh
ffag8f2g8fg82g8f8g8fg
rgarggh3f3dddaegg3
rsguufburfusbruf
aeufgaeugfagufgaegg
25262ggw4wgw4hw4h
ge8gfg82hf882fg88
eafauegfuaegfuagef
faeufag7efg7eg7f
efgaefuagfegfuafege
aeifehaiehfhiaehf
yw4ywfw3fwg4hw4h
aeygfygaeif7efg7eg7fe
eafae7g7ae8f8hehehf8h
efauefuaeugfuegufaef
rsgsihrgishgishrgr
aege7ff7e7ge7gf
a7aeg7fgae7f7eagf7eg
aefiheieiie
aefeufauefehf7ae7fh
aefiaegdegd7geg7dgeg7gf
afaufgueufueguagef
efihfieihfiehf
efaugfgauegfg
3g3tg3eafa3fa3ga33
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Phorpiex.4!c
tehtris Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh BehavesLike.Win32.Generic.lm
ALYac Dropped:Generic.Malware.S!dld!.BEA59C70
Cylance unsafe
Zillya Worm.Phorpiex.Win32.3020
Sangfor Trojan.Win32.Save.a
K7AntiVirus Clean
Alibaba Worm:Win32/Zonidel.a1268435
K7GW Clean
Cybereason malicious.78656d
Baidu Clean
VirIT Clean
Paloalto Clean
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Phorpiex.V
APEX Malicious
Avast Win32:WormX-gen [Wrm]
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.Win32.Zonidel.gen
BitDefender Dropped:Generic.Malware.S!dld!.BEA59C70
NANO-Antivirus Clean
ViRobot Trojan.Win.Z.Phorpiex.15872.B
MicroWorld-eScan Dropped:Generic.Malware.S!dld!.BEA59C70
Tencent Win32.Trojan.Zonidel.Gajl
TACHYON Clean
Sophos Clean
F-Secure Heuristic.HEUR/Malware
DrWeb Trojan.DownLoader46.39952
VIPRE Dropped:Generic.Malware.S!dld!.BEA59C70
TrendMicro Mal_DLDER
Trapmine Clean
FireEye Generic.mg.a6f1e6b5775a9421
Emsisoft Dropped:Generic.Malware.S!dld!.BEA59C70 (B)
SentinelOne Static AI - Malicious PE
GData Win32.Trojan.Phorpiex.D
Jiangmin Clean
Webroot W32.Malware.Gen
Varist W32/S-c70f2e64!Eldorado
Avira WORM/Phorpiex.absyt
Antiy-AVL Clean
Kingsoft Win32.HeurC.KVMH017.a
Gridinsoft Clean
Xcitium Clean
Arcabit Generic.Malware.S!dld!.BEA59C70
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan.Win32.Zonidel.gen
Microsoft Trojan:Win32/Leonem
Google Detected
AhnLab-V3 Trojan/Win.Dlder.C5556497
Acronis Clean
McAfee Artemis!A6F1E6B5775A
MAX malware (ai score=87)
VBA32 BScope.TrojanDownloader.Agent
Malwarebytes Trojan.Downloader
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Mal_DLDER
Rising Worm.Phorpiex!1.DF9C (CLASSIC)
Yandex Clean
Ikarus Win32.Outbreak
MaxSecure Clean
Fortinet W32/Phorpiex.V!worm
BitDefenderTheta Gen:NN.ZexaF.36608.auW@amhtHqki
AVG Win32:WormX-gen [Wrm]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.