Static | ZeroBOX

PE Compile Time

2023-01-20 23:21:06

PE Imphash

118a2343ba7a5763d9034e65dcc58b46

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00001c46 0x00001e00 7.33840715391
.rdata 0x00003000 0x0000063c 0x00000800 4.56401131002
.data 0x00004000 0x0001be30 0x0001c000 7.98937024558
.pdata 0x00020000 0x00000198 0x00000200 6.69213118529
INIT 0x00021000 0x00000432 0x00000600 3.88427397284
0x00022000 0x00003340 0x00003400 6.08580605678
.reloc 0x00026000 0x00000014 0x00000200 0.254705591457

Imports

Library cng.sys:
0x140003000 BCryptSetProperty
0x140003018 BCryptDecrypt
0x140003020 BCryptDestroyKey
Library ntoskrnl.exe:
0x140003038 RtlInitUnicodeString
0x140003040 KeWaitForSingleObject
0x140003048 ExAllocatePoolWithTag
0x140003050 ExFreePoolWithTag
0x140003070 MmAllocatePagesForMdlEx
0x140003078 PsCreateSystemThread
0x140003090 ObCloseHandle
0x140003098 ObfDereferenceObject
0x1400030a0 ZwCreateFile
0x1400030a8 ZwReadFile
0x1400030b0 ZwWriteFile
0x1400030b8 ZwClose
0x1400030c0 MmIsAddressValid
0x1400030c8 IoCreateFileEx
0x1400030d0 MmFlushImageSection
0x1400030d8 ZwDeleteFile
0x1400030e0 IoFileObjectType
0x1400030e8 RtlGetVersion
0x1400030f0 ZwQueryInformationFile
0x1400030f8 MmGetVirtualForPhysical
0x140003100 KeBugCheckEx

!This program cannot be run in DOS mode.
h.rdata
H.data
.pdata
h.reloc
STeI<x
\G1e Y!\%
9oZh~g]
H!D$@E3
!V)G\@
4rFJ/_$
W*`^pK
lED_x
a&mGW?tz'
>'_Nn4
,eQ711
fffffff
xxx????xxx????x
NtCreateThreadEx
NtProtectVirtualMemory
/T'H@~
c*69rS
$AtU (
dSO0t?
;},]Y!
wpf&vh
AD+1Xd
CE3L0J#f=
L8xsI|=
xV'kQ+'
QKxRf0L"
1!)D.O
K ^pBO
*E},}v
=Db)1>"
#5w_,"S
|sW;B:
Q-:<X$Z
d1\NCT
~K6<>$
C0~3>P
Hhu.BW
T)HaS4
^%XN^;FI
yy}hs*
Yk"Zfp
Cr&&k4
m!M`zcb
;vhLae
..8aso
|fy1#i
Gn'aeJ
j.hq h0
"YeD_8
iSw4TKEY
Y#H$Ak
,6tVo[
mr/QFC
s|fA!2
yzu7"*N,
(w>rfV
dke`0@
Eho%:d
=P+F`"
\FB."a!
Jg.xkND^m
w^#*a=
N.Q6LN`w
<A@!S
+4LF}Q
!vEUMM
eo^O8F
WTjvd=
4lZ]Y/
Eb|rBQ
|z*0o
00(@ j
?.NlF]
#K<6M@
ip87/WZ?8c
KUEv*
\Ve0r6
7eT3?6
#qs_M;0
Yj~/p}
+G%"h`
hBel>,
pal t({
>\:"vG
)-R%Q.
@1!GpH1
?E'o#*%
XZb"\s
hmsGp;
\T3!&_U=:O
v(ebEV
HC/.Nm?
L)]48,
_^Lw!r
&& )Aa
u9Fg2i
;#Y!~Lx
$=M }w
j6QA#/1
U,[l][Z
j6QA#/1
j6QA#/1
z_Q6H!
fubywo]m
WG<v'a
%LhW M_
P_08xc
"Er=0#
<Qi*#}
[#AH6\
D(cah4
w3Zw0%
3bf)_a
n pqk(a
.V,Xib1
<EWHxD\M
{wu$iy
l+{6N1h
|t$e#k
&E>foA
L'rs#gl
bh,2>XY7)RXR
BNh4#5
=Z(#NdNR
:2HTKF
7]7p3~
*}LrF
C{g[=f
R'X'Eu
C'[ a-
(teAV1
K}7iq
_M_$)Hv
JFw}@Q
vOZCs~
Z#=/"jm}
-znBA*
Cn^uMh'
OWI|!|
xDC@^"
qx"bRT
zc^vf5
H{|5(Ol
xbjZ$5{
fT-#l
J{w*4f
c8F5Gm
gK%6$
O*K^;l`
v miOA
@/PU>hJ
`pV4D7
&AypGZ
XkFhB-
q~SQ>]\~
'~Ry,z
;pz/uM
n]jcht{
@+F,-{
M8J}bSg
at )7\
oghkN>z{
#AtiV+o
o+T7 :Q
GmI`o"1
<4~9wE
}O%KUc
{tKg}
k;=,a"
p_[4'x
*WhQ%\
&Nlp9a
%gu#A2z
[+D {i
S6K)G)
pRg{nDy
f]4m>O
f5nJ-Y
2|d.zk
K.xHd&p
9n`!duK-
}x,B!u
!spAN/gW
1Wc2@7lC9BL
h"n>~E
yd9#/k;y32?
;gwPh~
'd|z:T
c;px+v
sS3w15
H(_c7T.
PV!}`rO
~3ca<P
g"h{K
'C(P66
|=i~K^
%E[.[x~
$SzIu
5[$CS}
:'J@>7
s?KN-8
+eC]D
[03VIv6=)}3
ck^Py!
j=RVp|
zFCKr
9!0A7g
e}UAU>{
~,& X}EZ
}Q9{`:b
r'B,iv
a>t^1u
BCryptOpenAlgorithmProvider
BCryptSetProperty
BCryptCloseAlgorithmProvider
BCryptGenerateSymmetricKey
BCryptDecrypt
BCryptDestroyKey
cng.sys
RtlInitUnicodeString
KeWaitForSingleObject
ExAllocatePoolWithTag
ExFreePoolWithTag
MmGetSystemRoutineAddress
MmProtectMdlSystemAddress
MmMapLockedPagesSpecifyCache
MmAllocatePagesForMdlEx
PsCreateSystemThread
ObReferenceObjectByHandle
ObReferenceObjectByHandleWithTag
ObCloseHandle
ObfDereferenceObject
ZwCreateFile
ZwReadFile
ZwWriteFile
ZwClose
MmIsAddressValid
IoCreateFileEx
MmFlushImageSection
ZwDeleteFile
IoFileObjectType
RtlGetVersion
ZwQueryInformationFile
MmGetVirtualForPhysical
KeBugCheckEx
ntoskrnl.exe
Hcy<fA
A^A]fD
CMqYfA
pA]A\_
6VWAVH
L+M0D:
D$ FILE
S;AVAWf
WATAU@:
H!D$@E+
Washington1
Redmond1
Microsoft Corporation1)0'
Microsoft Code Verification Root0
110222192517Z
210222193517Z0
VeriSign, Inc.10
VeriSign Trust Network1:08
1(c) 2006 VeriSign, Inc. - For authorized use only1E0C
<VeriSign Class 3 Public Primary Certification Authority - G50
Dhttp://crl.microsoft.com/pki/crl/products/MicrosoftCodeVerifRoot.crl0
,N<jPl
3BH8Q:|8
VeriSign, Inc.10
VeriSign Trust Network1;09
2Terms of use at https://www.verisign.com/rpa (c)101.0,
%VeriSign Class 3 Code Signing 2010 CA0
120717000000Z
130717235959Z0
Beijing1
Beijing1A0?
8BEIJING XINDA HUANYU NETWORK SECURITY TECHNOLOGY CO.,LTD1>0<
5Digital ID Class 3 - Microsoft Software Validation v21A0?
8BEIJING XINDA HUANYU NETWORK SECURITY TECHNOLOGY CO.,LTD0
$2<5F~
/http://csc3-2010-crl.verisign.com/CSC3-2010.crl0D
https://www.verisign.com/rpa0
http://ocsp.verisign.com0;
/http://csc3-2010-aia.verisign.com/CSC3-2010.cer0
VeriSign, Inc.10
VeriSign Trust Network1:08
1(c) 2006 VeriSign, Inc. - For authorized use only1E0C
<VeriSign Class 3 Public Primary Certification Authority - G50
100208000000Z
200207235959Z0
VeriSign, Inc.10
VeriSign Trust Network1;09
2Terms of use at https://www.verisign.com/rpa (c)101.0,
%VeriSign Class 3 Code Signing 2010 CA0
https://www.verisign.com/cps0*
https://www.verisign.com/rpa0
[0Y0W0U
image/gif0!00
#http://logo.verisign.com/vslogo.gif04
#http://crl.verisign.com/pca3-g5.crl04
http://ocsp.verisign.com0
VeriSignMPKI-2-80
VeriSign, Inc.10
VeriSign Trust Network1;09
2Terms of use at https://www.verisign.com/rpa (c)101.0,
%VeriSign Class 3 Code Signing 2010 CA
ZwQuerySystemInformation
RtlImageNtHeader
RtlImageDirectoryEntryToData
Microsoft Primitive Provider
ChainingModeECB
ChainingMode
\SystemRoot\System32\GSDrv.bin
\SystemRoot\System32\ntdll.dll
NtOpenFile
Antivirus Signature
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.Hitbrovi.4!c
Elastic malicious (high confidence)
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Artemis!Trojan
ALYac Gen:Variant.Ulise.404768
Cylance Unsafe
Zillya Tool.FakeCert.Win32.1807
Sangfor Trojan.Win32.Hitbrovi.Vhvi
CrowdStrike win/malicious_confidence_100% (W)
Alibaba Trojan:Win32/Hitbrovi.85a1d1b0
K7GW Riskware ( 00584baa1 )
K7AntiVirus Riskware ( 00584baa1 )
huorong Clean
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec Clean
tehtris Clean
ESET-NOD32 Clean
APEX Malicious
Avast Win64:Evo-gen [Trj]
Cynet Malicious (score: 99)
Kaspersky HEUR:Trojan.Win32.Agentb.gen
BitDefender Gen:Variant.Ulise.404768
NANO-Antivirus Trojan.Win64.Hitbrovi.kmqdmq
ViRobot Clean
MicroWorld-eScan Gen:Variant.Ulise.404768
Tencent Trojan.Win32.Agentb.km
Sophos Compromised BEIJING XINDA HUANYU CodeSigningCert (PUA)
F-Secure Trojan.TR/Hitbrovi.edpvz
DrWeb Trojan.Rootkit.22033
VIPRE Gen:Variant.Ulise.404768
TrendMicro Clean
McAfeeD ti!9EA773E57823
Trapmine Clean
CTX sys.trojan.hitbrovi
Emsisoft Gen:Variant.Ulise.404768 (B)
Ikarus PUA.RiskWare.Fakecert
FireEye Generic.mg.df090fc9db83229c
Jiangmin Rootkit.Agent.tsx
Webroot Clean
Varist Clean
Avira TR/Hitbrovi.edpvz
Fortinet PossibleThreat.PALLAS.M
Antiy-AVL RiskWare/Win32.FakeCert
Kingsoft malware.kb.a.924
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Ulise.D62D20
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan.Win32.Agentb.gen
Microsoft Trojan:Win32/Hitbrovi!pz
Google Clean
AhnLab-V3 Trojan/Win.Generic.R560727
Acronis Clean
McAfee Artemis!DF090FC9DB83
TACHYON Clean
VBA32 Clean
Malwarebytes Generic.Malware.AI.DDS
Panda Trj/CI.A
Zoner Clean
TrendMicro-HouseCall Clean
Rising Rootkit.Agent!1.E3B0 (CLASSIC)
Yandex RiskWare.FakeCert!885UkWm3uEM
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.WIN32.Agentb.gen_224290
GData Gen:Variant.Ulise.404768
AVG Win64:Evo-gen [Trj]
DeepInstinct MALICIOUS
alibabacloud Clean
No IRMA results available.