Static | ZeroBOX

PE Compile Time

2024-04-23 15:49:42

PE Imphash

5c1e1a097c044357c4eefded92c1ce68

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000057a2 0x00005800 6.20736840468
.rdata 0x00007000 0x00003414 0x00003600 4.47999411305
.data 0x0000b000 0x00002340 0x00001000 2.25631942372
.pdata 0x0000e000 0x000005b8 0x00000600 4.16899414948
.reloc 0x0000f000 0x000003b0 0x00000400 3.68598866286
.rsrc 0x00010000 0x00023f54 0x00024000 5.37312634544

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x000337f0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000337f0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000337f0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000337f0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000337f0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000337f0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x00033c58 0x00000068 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x00033cc0 0x00000294 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data

Imports

Library KERNEL32.dll:
0x140007000 GetCurrentThread
0x140007008 LoadLibraryW
0x140007010 GetProcAddress
0x140007018 QueueUserAPC
0x140007020 GetModuleHandleA
0x140007028 VirtualProtect
0x140007030 GetCommandLineW
0x140007038 GetStartupInfoW
0x140007040 GetLastError
0x140007048 HeapFree
0x140007050 EncodePointer
0x140007058 DecodePointer
0x140007060 HeapAlloc
0x140007068 RaiseException
0x140007070 RtlPcToFileHeader
0x140007080 GetModuleHandleW
0x140007088 ExitProcess
0x140007090 WriteFile
0x140007098 GetStdHandle
0x1400070a0 GetModuleFileNameW
0x1400070a8 RtlUnwindEx
0x1400070b0 FreeEnvironmentStringsW
0x1400070b8 GetEnvironmentStringsW
0x1400070c0 SetHandleCount
0x1400070d0 GetFileType
0x1400070d8 DeleteCriticalSection
0x1400070e0 FlsGetValue
0x1400070e8 FlsSetValue
0x1400070f0 FlsFree
0x1400070f8 SetLastError
0x140007100 GetCurrentThreadId
0x140007108 FlsAlloc
0x140007110 HeapSetInformation
0x140007118 GetVersion
0x140007120 HeapCreate
0x140007128 QueryPerformanceCounter
0x140007130 GetTickCount
0x140007138 GetCurrentProcessId
0x140007140 GetSystemTimeAsFileTime
0x140007148 Sleep
0x140007150 HeapSize
0x140007158 LeaveCriticalSection
0x140007160 EnterCriticalSection
0x140007168 UnhandledExceptionFilter
0x140007170 IsDebuggerPresent
0x140007178 RtlVirtualUnwind
0x140007180 RtlLookupFunctionEntry
0x140007188 RtlCaptureContext
0x140007190 TerminateProcess
0x140007198 GetCurrentProcess
0x1400071a0 GetCPInfo
0x1400071a8 GetACP
0x1400071b0 GetOEMCP
0x1400071b8 IsValidCodePage
0x1400071c0 HeapReAlloc
0x1400071c8 WideCharToMultiByte
0x1400071d0 LCMapStringW
0x1400071d8 MultiByteToWideChar
0x1400071e0 GetStringTypeW
Library USER32.dll:
0x1400071f0 MessageBoxW

!This program cannot be run in DOS mode.
`.rdata
@.data
.pdata
@.reloc
B.rsrc
D$X9D$0s
ATAUAVH
A^A]A\
WATAUAVAWH
@A_A^A]A\_
t$ WATAUH
WATAUAVAWH
A_A^A]A\_
fD9#tSH
CfD9#u
fD91u:A
Hct$PH
shHcD$XH
tLf9t
ATAUAVH
fD9t$b
A^A]A\
fffffff
fffffff
WATAUAVAWH
0A_A^A]A\_
LcA<E3
@SUVWATAUAVH
PA^A]A\_^][
UVWATAUH
D$&8\$&t-8X
@A]A\_^]
@UATAUAVAWH
!t$(H!t$ A
A_A^A]A\]
@UATAUAVAWH
A_A^A]A\]
bad allocation
Unknown exception
CorExitProcess
GetProcessWindowStation
GetUserObjectInformationW
GetLastActivePopup
GetActiveWindow
MessageBoxW
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__eabi
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
NtTestAlert
InternetOpenW
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
GetCurrentThread
LoadLibraryW
GetProcAddress
QueueUserAPC
GetModuleHandleA
VirtualProtect
KERNEL32.dll
MessageBoxW
USER32.dll
GetCommandLineW
GetStartupInfoW
GetLastError
HeapFree
EncodePointer
DecodePointer
HeapAlloc
RaiseException
RtlPcToFileHeader
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
RtlUnwindEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
HeapSetInformation
GetVersion
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
LeaveCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
.?AVbad_alloc@std@@
.?AVexception@std@@
.?AVtype_info@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Sl1zf
}!.fn|
ZJ6m0
{7kkk,--Q
u-2s(t
v_ya"!
F1g`4EvV
w1tA.g
r/@ '`
LC0_4(
9r5M0;e
cV/0S0:
>f.~b
T*=# K)
nnn~zcc
Western Cape1
Durbanville1
Thawte1
Thawte Certification10
Thawte Timestamping CA0
121221000000Z
201230235959Z0^1
Symantec Corporation100.
'Symantec Time Stamping Services CA - G20
http://ocsp.thawte.com0
.http://crl.thawte.com/ThawteTimestampingCA.crl0
TimeStamp-2048-10
Symantec Corporation100.
'Symantec Time Stamping Services CA - G20
121018000000Z
201229235959Z0b1
Symantec Corporation1402
+Symantec Time Stamping Services Signer - G40
http://ts-ocsp.ws.symantec.com07
+http://ts-aia.ws.symantec.com/tss-ca-g2.cer0<
+http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
TimeStamp-2048-20
WoSign CA Limited1'0%
WoSign Class 3 Code Signing CA0
160615081613Z
170715081613Z0
admin@yuelun.com100.
'http://ocsp1.wosign.com/class3/code/ca106
*http://aia1.wosign.com/class3.code.ca1.cer07
&http://crls1.wosign.com/ca1-code-3.crl0O
http://www.wosign.com/policy/0
WoSign CA Limited1*0(
!Certification Authority of WoSign0
090808010001Z
390808010001Z0U1
WoSign CA Limited1*0(
!Certification Authority of WoSign0
TzQhnw
WoSign CA Limited1*0(
!Certification Authority of WoSign0
090808010005Z
240808010005Z0R1
WoSign CA Limited1'0%
WoSign Class 3 Code Signing CA0
%DEe3F
http://crls1.wosign.com/ca1.crl0o
http://ocsp1.wosign.com/ca106
*http://aia1.wosign.com/ca1-class3-code.cer0
http://www.wosign.com/policy/0
>'H7G^
StartCom Ltd.1+0)
"Secure Digital Certificate Signing1)0'
StartCom Certification Authority0
060917224636Z
191231235959Z0U1
WoSign CA Limited1*0(
!Certification Authority of WoSign0
TzQhnw
http://ocsp.startssl.com/ca00
$http://aia.startssl.com/certs/ca.crt02
!http://crl.startssl.com/sfsca.crl0
7CE[2.E
WoSign CA Limited1'0%
WoSign Class 3 Code Signing CA
{!Eph
Symantec Corporation100.
'Symantec Time Stamping Services CA - G2
161027005716Z0#
M|b2F+
Western Cape1
Durbanville1
Thawte1
Thawte Certification10
Thawte Timestamping CA0
121221000000Z
201230235959Z0^1
Symantec Corporation100.
'Symantec Time Stamping Services CA - G20
http://ocsp.thawte.com0
.http://crl.thawte.com/ThawteTimestampingCA.crl0
TimeStamp-2048-10
Symantec Corporation100.
'Symantec Time Stamping Services CA - G20
121018000000Z
201229235959Z0b1
Symantec Corporation1402
+Symantec Time Stamping Services Signer - G40
http://ts-ocsp.ws.symantec.com07
+http://ts-aia.ws.symantec.com/tss-ca-g2.cer0<
+http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
TimeStamp-2048-20
WoSign CA Limited1
090808010001Z
390808010001Z0F1
WoSign CA Limited1
jk~-mX\J
5l N"a
WoSign CA Limited1
150710005858Z
250710005858Z0S1
CN1(0&
WoSign CA Limited0
http://cr.wscrl.cn/ca2.crl0_
http://oc.wsocsp.cn/ca20*
http://ai.wscrl.cn/ca2-cs4.cer0
http://www.wosign.com/policy/0
WoSign CA Limited1(0&
160615080535Z
170715080535Z0
Fujian1
Xiamen1
Private Organization1
3502032005373271
3610011<0:
307100.
admin@yuelun.com100.
G(#Hk@f[2
y|\PYi
http://ocsp2.wosign.cn/ca2/cs40-
!http://aia2.wosign.cn/ca2.cs4.cer03
"http://crls2.wosign.cn/ca2-cs4.crl04
CN-Fujian-3502032005373270[
http://www.wosign.com/policy/0
StartCom Ltd.1+0)
"Secure Digital Certificate Signing1)0'
StartCom Certification Authority0
060917224636Z
191231235959Z0F1
WoSign CA Limited1
jk~-mX\J
http://ocsp.startssl.com/ca00
$http://aia.startssl.com/certs/ca.crt02
!http://crl.startssl.com/sfsca.crl0
c,_qH|`
WoSign CA Limited1(0&
:'\@M(s
oZp#s]
Symantec Corporation100.
'Symantec Time Stamping Services CA - G2
161027005717Z0#
@)f;MU2
mscoree.dll
runtime error
TLOSS error
SING error
DOMAIN error
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
- abort() has been called
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
USER32.DLL
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
((((( H
h(((( H
H
wininet.dll
http://8.138.0.158/123.conf
Failed to download the file!
VS_VERSION_INFO
StringFileInfo
080403a8
Comments
WeGame
CompanyName
Tencent
FileDescription
WeGame
FileVersion
1.0.0.0
LegalCopyright
Copyright ? 2019 Tencent
LegalTrademarks
ProductName
WeGame
ProductVersion
1.0.0.0
VarFileInfo
Translation
<<<Obsolete>>
<<<Obsolete>>
Antivirus Signature
Bkav W32.Common.4999DDF8
Lionic Trojan.Win32.Agent.Y!c
tehtris Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Clean
ALYac Trojan.GenericKDZ.106434
Cylance Unsafe
Zillya Downloader.Agent.Win64.6281
Sangfor Downloader.Win32.Agent.Vvbv
K7AntiVirus Trojan-Downloader ( 005b4a5f1 )
Alibaba TrojanDownloader:Win64/Genric.981c426f
K7GW Trojan-Downloader ( 005b4a5f1 )
Cybereason malicious.81f003
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec Trojan.Gen.MBT
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win64/TrojanDownloader.Agent.ASS
APEX Clean
Avast Win64:Evo-gen [Trj]
Cynet Clean
Kaspersky Trojan-Downloader.Win32.Agent.xycsah
BitDefender Trojan.GenericKDZ.106434
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Trojan.GenericKDZ.106434
Tencent Backdoor.Win32.Downloader_l.16001170
TACHYON Clean
Sophos Mal/Generic-S
F-Secure Trojan.TR/Dldr.Agent.lhkgd
DrWeb Clean
VIPRE Trojan.GenericKDZ.106434
TrendMicro TROJ_GEN.R03BC0XDT24
McAfeeD ti!C2FFDC8ABAD1
Trapmine Clean
FireEye Generic.mg.2b2690881f003051
Emsisoft Trojan.GenericKDZ.106434 (B)
SentinelOne Clean
GData Trojan.GenericKDZ.106434
Jiangmin Clean
Webroot Clean
Varist W64/ABDownloader.PGBU-6144
Avira TR/Dldr.Agent.lhkgd
Antiy-AVL GrayWare[AdWare]/Win32.Caypnamer
Kingsoft Win32.Trojan-Downloader.Agent.xycsah
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Generic.D19FC2
SUPERAntiSpyware Clean
ZoneAlarm Trojan-Downloader.Win32.Agent.xycsah
Microsoft Trojan:Win32/Casdet!rfn
Google Detected
AhnLab-V3 Trojan/Win.Generic.R646446
Acronis Clean
McAfee Clean
MAX malware (ai score=86)
VBA32 Clean
Malwarebytes Neshta.Virus.FileInfector.DDS
Panda Clean
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R03BC0XDT24
Rising Downloader.Agent!8.B23 (TFE:5:cg4jjrc1DLF)
Yandex Clean
Ikarus Trojan-Downloader.Win64.Agent
MaxSecure Trojan.Malware.242543320.susgen
Fortinet W64/Agent.ASS!tr.dldr
BitDefenderTheta Clean
AVG Win64:Evo-gen [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_70% (W)
alibabacloud Trojan[downloader]:Win/Agent.ABK
No IRMA results available.