Static | ZeroBOX

PE Compile Time

2009-05-12 17:14:39

PE Imphash

25b3acc640473b6fce722f16eff93149

PEiD Signatures

UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
UPX0 0x00001000 0x0000c000 0x00000000 0.0
UPX1 0x0000d000 0x0000b000 0x0000ae00 7.8975165192
.rsrc 0x00018000 0x00001000 0x00000a00 3.35099200565

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0001805c 0x00000768 LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library ADVAPI32.dll:
0x41883c FreeSid
Library KERNEL32.DLL:
0x418844 LoadLibraryA
0x418848 ExitProcess
0x41884c GetProcAddress
0x418850 VirtualProtect
Library MSVCRT.dll:
0x418858 _iob
Library WS2_32.dll:
0x418860 WSARecv
Library WSOCK32.dll:
0x418868 WSAGetLastError

!This program cannot be run in DOS mode.
?&20MH
-PSp8W}
~Y'q7;
JQ]Jjz
P<cT4+H
b;vhX:
phLZWCp
{{G'V0
1jxRxG
DFu.ho
uD6-vo
?UG^~9
harW=Y
0{.pFU
va;RtW
u?;DsEM
9pxtAA
)R\L}^z
|PY\hz
pWj0V/
[+~xr:
(cT?1N
fusPWA#h
>t:l6K
I5 uT=
.XZ -~i\
ncs0Q*6
Q^Ht0Hup!
D{k*T7
#_%~7h
TWLiMV5&
76^(];
F(Qs%-
t"j.:Q
n+0X'r)
,Fu-jU
uKXu^lV
ft-2\*
*FIurn *
V A5Qc
C/7KHI]H/
p]G6|P/
}>+)&B
&{Q;t
ph@nQ]
djU9/Iu
9vl=[[
hws2_ThLw&
VS%}(X"k
unM]^^
G63F0F
<U3a3'
J.&.Tp
4hXJB8
~tld\i
iRH>4*
l)?123456789abcdef
ABCDEF'
i6l7L8M
4A4B$C
iIdJ@Kp
Tue{ed
7(JP\6
 !"#$%
L()*+,-./
)GHIJKLMNO
#STUVWXYZWghijklmnopqr
stuvwxyz?+/''
?%s: C
y level
er th%
kOD[R6gW0..
oi'URL
l;wr4gY>go
Basic
okie:2
Cmix PUT
b:T:p:u:v:rkVhwH:y:z:C:H:
P:A:g:X:
apr_sock1_
;)ct()
fB10 fail
 buff
#l%yKNFO:9
HTTP/1.0
typee+
+ Apac
h/+2.37
wntgo+
KsKCSVGY
w $%%
ax!WARNn
sults7
?ERROR
B2&@p
A6@O/[
T[+/-sd]k
2tkb/s
vneTrzsz
rN:'[Kb(
cbYmXYs
velCDr
%0#Pa!
O:name:;S
/lW&nb
6S-lS[
500WTPc
vcp'<p
Found6,
_ttp://w
.a&.FnQ
3g* 1996N;m
Wwi\>Zeus
8$Kvi#
xit 3Y
cXUxy:p
8F[-E\
gzip'/-CO4
Qd ."a
c?yr9D
dl7xHc
>Defaj
e;-T c
)lOOSP
KMG0E`
h,SsyRm
]bReerz-X
n-S) ,
mHW>nd=U
ldQlZs
l`A?Dk1
A/SO;ad#
d?u ub
vneddP
ZwQupyI
l32?QUe!
dTUUU2
F(etvG
-)epVa
Ov"lap
_!~k1v
rch%wcsncm
vBsaUi
XPTPSW
ADVAPI32.dll
KERNEL32.DLL
MSVCRT.dll
WS2_32.dll
WSOCK32.dll
FreeSid
ExitProcess
GetProcAddress
LoadLibraryA
VirtualProtect
WSARecv
VS_VERSION_INFO
StringFileInfo
040904b0
Comments
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
CompanyName
Apache Software Foundation
FileDescription
ApacheBench command line utility
FileVersion
2.2.14
InternalName
ab.exe
LegalCopyright
Copyright 2009 The Apache Software Foundation.
OriginalFilename
ab.exe
ProductName
Apache HTTP Server
ProductVersion
2.2.14
VarFileInfo
Translation
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Jorik.lrUS
tehtris Clean
ClamAV Win.Trojan.Swrort-5710536-0
CMC Clean
CAT-QuickHeal Trojan.Swrort.A
Skyhigh Swrort.d
ALYac Generic.ShellCode.Marte.3.C4C51720
Cylance Unsafe
Zillya Trojan.Rozena.Win32.196798
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 001172b51 )
Alibaba Trojan:Win32/CobaltStrike.5c89
K7GW Trojan ( 001172b51 )
Cybereason malicious.5dd7d9
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec Packed.Generic.347
Elastic malicious (moderate confidence)
ESET-NOD32 a variant of Win32/Rozena.AA
APEX Clean
Avast Win32:Evo-gen [Trj]
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.Win32.Generic
BitDefender Generic.ShellCode.Marte.3.C4C51720
NANO-Antivirus Virus.Win32.Gen-Crypt.ccnc
ViRobot Clean
MicroWorld-eScan Generic.ShellCode.Marte.3.C4C51720
Tencent Trojan.Win32.Metasploit_heur.16000690
TACHYON Clean
Sophos Mal/Generic-S
F-Secure Trojan.TR/Crypt.ZPACK.Gen
DrWeb Clean
VIPRE Generic.ShellCode.Marte.3.C4C51720
TrendMicro Backdoor.Win32.SWRORT.SMAL01
McAfeeD Real Protect-LS!07924A75DD7D
Trapmine malicious.high.ml.score
FireEye Generic.mg.07924a75dd7d92d0
Emsisoft Generic.ShellCode.Marte.3.C4C51720 (B)
huorong HVM:Trojan/Swrort.gen!A
GData Win32.Trojan.PSE.12DT0MV
Jiangmin Clean
Webroot W32.Trojan.Swrort.Gen
Varist W32/Swrort.B.gen!Eldorado
Avira TR/Crypt.ZPACK.Gen
Antiy-AVL Trojan/Win32.Rozena
Kingsoft malware.kb.b.936
Gridinsoft Clean
Xcitium TrojWare.Win32.Rozena.A@4jwdqr
Arcabit Generic.ShellCode.Marte.3.C4C51720
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan.Win32.Generic
Microsoft Trojan:Win32/Meterpreter!pz
Google Detected
AhnLab-V3 Backdoor/Win32.Bifrose.R12476
Acronis Clean
McAfee GenericRXAA-AA!07924A75DD7D
MAX malware (ai score=83)
VBA32 Trojan.Swrort
Malwarebytes Generic.Malware.AI.DDS
Panda Trj/Genetic.gen
Zoner Clean
TrendMicro-HouseCall Backdoor.Win32.SWRORT.SMAL01
Rising Trojan.Crypto!8.364 (CLOUD)
Yandex Trojan.GenAsa!O0/tdGI4TGA
Ikarus Trojan.Agent
MaxSecure Clean
Fortinet W32/Rozena.ABV!tr
BitDefenderTheta Gen:NN.ZexaF.36810.cmKfa4g8Bcgi
AVG Win32:Evo-gen [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_100% (W)
alibabacloud Backdoor:Win/shellcode.api(dyn)
No IRMA results available.