Static | ZeroBOX

PE Compile Time

2023-01-20 23:21:06

PE Imphash

118a2343ba7a5763d9034e65dcc58b46

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00001c46 0x00001e00 7.33840715391
.rdata 0x00003000 0x0000063c 0x00000800 4.56401131002
.data 0x00004000 0x0001be30 0x0001c000 7.98937024558
.pdata 0x00020000 0x00000198 0x00000200 6.69213118529
INIT 0x00021000 0x00000432 0x00000600 3.88427397284
0x00022000 0x00003340 0x00003400 6.08580605678
.reloc 0x00026000 0x00000014 0x00000200 0.254705591457

Imports

Library cng.sys:
0x140003000 BCryptSetProperty
0x140003018 BCryptDecrypt
0x140003020 BCryptDestroyKey
Library ntoskrnl.exe:
0x140003038 RtlInitUnicodeString
0x140003040 KeWaitForSingleObject
0x140003048 ExAllocatePoolWithTag
0x140003050 ExFreePoolWithTag
0x140003070 MmAllocatePagesForMdlEx
0x140003078 PsCreateSystemThread
0x140003090 ObCloseHandle
0x140003098 ObfDereferenceObject
0x1400030a0 ZwCreateFile
0x1400030a8 ZwReadFile
0x1400030b0 ZwWriteFile
0x1400030b8 ZwClose
0x1400030c0 MmIsAddressValid
0x1400030c8 IoCreateFileEx
0x1400030d0 MmFlushImageSection
0x1400030d8 ZwDeleteFile
0x1400030e0 IoFileObjectType
0x1400030e8 RtlGetVersion
0x1400030f0 ZwQueryInformationFile
0x1400030f8 MmGetVirtualForPhysical
0x140003100 KeBugCheckEx

!This program cannot be run in DOS mode.
h.rdata
H.data
.pdata
h.reloc
STeI<x
\G1e Y!\%
9oZh~g]
H!D$@E3
!V)G\@
4rFJ/_$
W*`^pK
lED_x
a&mGW?tz'
>'_Nn4
,eQ711
fffffff
xxx????xxx????x
NtCreateThreadEx
NtProtectVirtualMemory
/T'H@~
c*69rS
$AtU (
dSO0t?
;},]Y!
wpf&vh
AD+1Xd
CE3L0J#f=
L8xsI|=
xV'kQ+'
QKxRf0L"
1!)D.O
K ^pBO
*E},}v
=Db)1>"
#5w_,"S
|sW;B:
Q-:<X$Z
d1\NCT
~K6<>$
C0~3>P
Hhu.BW
T)HaS4
^%XN^;FI
yy}hs*
Yk"Zfp
Cr&&k4
m!M`zcb
;vhLae
..8aso
|fy1#i
Gn'aeJ
j.hq h0
"YeD_8
iSw4TKEY
Y#H$Ak
,6tVo[
mr/QFC
s|fA!2
yzu7"*N,
(w>rfV
dke`0@
Eho%:d
=P+F`"
\FB."a!
Jg.xkND^m
w^#*a=
N.Q6LN`w
<A@!S
+4LF}Q
!vEUMM
eo^O8F
WTjvd=
4lZ]Y/
Eb|rBQ
|z*0o
00(@ j
?.NlF]
#K<6M@
ip87/WZ?8c
KUEv*
\Ve0r6
7eT3?6
#qs_M;0
Yj~/p}
+G%"h`
hBel>,
pal t({
>\:"vG
)-R%Q.
@1!GpH1
?E'o#*%
XZb"\s
hmsGp;
\T3!&_U=:O
v(ebEV
HC/.Nm?
L)]48,
_^Lw!r
&& )Aa
u9Fg2i
;#Y!~Lx
$=M }w
j6QA#/1
U,[l][Z
j6QA#/1
j6QA#/1
z_Q6H!
fubywo]m
WG<v'a
%LhW M_
P_08xc
"Er=0#
<Qi*#}
[#AH6\
D(cah4
w3Zw0%
3bf)_a
n pqk(a
.V,Xib1
<EWHxD\M
{wu$iy
l+{6N1h
|t$e#k
&E>foA
L'rs#gl
bh,2>XY7)RXR
BNh4#5
=Z(#NdNR
:2HTKF
7]7p3~
*}LrF
C{g[=f
R'X'Eu
C'[ a-
(teAV1
K}7iq
_M_$)Hv
JFw}@Q
vOZCs~
Z#=/"jm}
-znBA*
Cn^uMh'
OWI|!|
xDC@^"
qx"bRT
zc^vf5
H{|5(Ol
xbjZ$5{
fT-#l
J{w*4f
c8F5Gm
gK%6$
O*K^;l`
v miOA
@/PU>hJ
`pV4D7
&AypGZ
XkFhB-
q~SQ>]\~
'~Ry,z
;pz/uM
n]jcht{
@+F,-{
M8J}bSg
at )7\
oghkN>z{
#AtiV+o
o+T7 :Q
GmI`o"1
<4~9wE
}O%KUc
{tKg}
k;=,a"
p_[4'x
*WhQ%\
&Nlp9a
%gu#A2z
[+D {i
S6K)G)
pRg{nDy
f]4m>O
f5nJ-Y
2|d.zk
K.xHd&p
9n`!duK-
}x,B!u
!spAN/gW
1Wc2@7lC9BL
h"n>~E
yd9#/k;y32?
;gwPh~
'd|z:T
c;px+v
sS3w15
H(_c7T.
PV!}`rO
~3ca<P
g"h{K
'C(P66
|=i~K^
%E[.[x~
$SzIu
5[$CS}
:'J@>7
s?KN-8
+eC]D
[03VIv6=)}3
ck^Py!
j=RVp|
zFCKr
9!0A7g
e}UAU>{
~,& X}EZ
}Q9{`:b
r'B,iv
a>t^1u
BCryptOpenAlgorithmProvider
BCryptSetProperty
BCryptCloseAlgorithmProvider
BCryptGenerateSymmetricKey
BCryptDecrypt
BCryptDestroyKey
cng.sys
RtlInitUnicodeString
KeWaitForSingleObject
ExAllocatePoolWithTag
ExFreePoolWithTag
MmGetSystemRoutineAddress
MmProtectMdlSystemAddress
MmMapLockedPagesSpecifyCache
MmAllocatePagesForMdlEx
PsCreateSystemThread
ObReferenceObjectByHandle
ObReferenceObjectByHandleWithTag
ObCloseHandle
ObfDereferenceObject
ZwCreateFile
ZwReadFile
ZwWriteFile
ZwClose
MmIsAddressValid
IoCreateFileEx
MmFlushImageSection
ZwDeleteFile
IoFileObjectType
RtlGetVersion
ZwQueryInformationFile
MmGetVirtualForPhysical
KeBugCheckEx
ntoskrnl.exe
Hcy<fA
A^A]fD
CMqYfA
pA]A\_
6VWAVH
L+M0D:
D$ FILE
S;AVAWf
WATAU@:
H!D$@E+
Greater Manchester1
Salford1
Comodo CA Limited1!0
AAA Certificate Services0
210525000000Z
281231235959Z0V1
Sectigo Limited1-0+
$Sectigo Public Code Signing Root R460
H/(@Bp 6
2http://crl.comodoca.com/AAACertificateServices.crl04
http://ocsp.comodoca.com0
Sectigo Limited1+0)
"Sectigo Public Code Signing CA R360
211110000000Z
241109235959Z0W1
Seoul1
Hangil IT Co., Ltd1
Hangil IT Co., Ltd0
https://sectigo.com/CPS0
8http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
8http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
http://ocsp.sectigo.com0
y3S^fl
Sectigo Limited1-0+
$Sectigo Public Code Signing Root R460
210322000000Z
360321235959Z0T1
Sectigo Limited1+0)
"Sectigo Public Code Signing CA R360
FFlCx@
H/(@Bp 6
:http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0{
:http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
http://ocsp.sectigo.com0
ts7!:o
n0PPd}
Sectigo Limited1+0)
"Sectigo Public Code Signing CA R36
Greater Manchester1
Salford1
Comodo CA Limited1!0
AAA Certificate Services0
210525000000Z
281231235959Z0V1
Sectigo Limited1-0+
$Sectigo Public Code Signing Root R460
H/(@Bp 6
2http://crl.comodoca.com/AAACertificateServices.crl04
http://ocsp.comodoca.com0
Sectigo Limited1+0)
"Sectigo Public Code Signing CA R360
211110000000Z
241109235959Z0W1
Seoul1
Hangil IT Co., Ltd1
Hangil IT Co., Ltd0
https://sectigo.com/CPS0
8http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
8http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
http://ocsp.sectigo.com0
y3S^fl
Sectigo Limited1-0+
$Sectigo Public Code Signing Root R460
210322000000Z
360321235959Z0T1
Sectigo Limited1+0)
"Sectigo Public Code Signing CA R360
FFlCx@
H/(@Bp 6
:http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0{
:http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
http://ocsp.sectigo.com0
ts7!:o
n0PPd}
Sectigo Limited1+0)
"Sectigo Public Code Signing CA R36
h^#RN
ZwQuerySystemInformation
RtlImageNtHeader
RtlImageDirectoryEntryToData
Microsoft Primitive Provider
ChainingModeECB
ChainingMode
\SystemRoot\System32\GSDrv.bin
\SystemRoot\System32\ntdll.dll
NtOpenFile
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.Hitbrovi.4!c
Elastic malicious (high confidence)
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Artemis!Trojan
ALYac Clean
Cylance Unsafe
Zillya Tool.FakeCert.Win32.1807
Sangfor Clean
CrowdStrike win/malicious_confidence_100% (W)
Alibaba Trojan:Win32/Hitbrovi.83bf11d2
K7GW Clean
K7AntiVirus Clean
huorong Clean
Baidu Clean
VirIT Clean
Paloalto Clean
Symantec Trojan.Gen.MBT
tehtris Clean
ESET-NOD32 a variant of Generik.CROZTXS
APEX Malicious
Avast Win64:Evo-gen [Trj]
Cynet Malicious (score: 99)
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Gen:Variant.Ulise.404768
NANO-Antivirus Trojan.Win64.DownLoad4.khwkvg
ViRobot Clean
MicroWorld-eScan Gen:Variant.Ulise.404768
Tencent Malware.Win32.Gencirc.10be6d08
Sophos Mal/BadCert-Gen
F-Secure Trojan.TR/Hitbrovi.edpvz
DrWeb Trojan.DownLoad4.15026
VIPRE Gen:Variant.Ulise.404768
TrendMicro Clean
McAfeeD ti!64DF21CAADA7
Trapmine Clean
CTX sys.trojan.hitbrovi
Emsisoft MalCert-S.PR (A)
Ikarus Trojan.Win32.Generic
FireEye Generic.mg.919caff04831cd3c
Jiangmin Rootkit.Agent.tsx
Webroot Clean
Varist Clean
Avira TR/Hitbrovi.edpvz
Fortinet W32/RedLine.CERT!tr
Antiy-AVL RiskWare/Win32.FakeCert
Kingsoft Win32.Troj.Unknown.a
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Ulise.D62D20
SUPERAntiSpyware Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
Microsoft Trojan:Win32/Hitbrovi!pz
Google Detected
AhnLab-V3 Trojan/Win.Generic.R560727
Acronis Clean
McAfee Artemis!919CAFF04831
TACHYON Clean
VBA32 Trojan.Download
Malwarebytes GenCBL.Ransom.FileCryptor.DDS
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Clean
Rising Trojan.MalCert@XH.28F9 (CERT:706m2ca14kswbu3NHF2GfQ)
Yandex RiskWare.FakeCert!885UkWm3uEM
SentinelOne Static AI - Malicious PE
MaxSecure Clean
GData Gen:Variant.Ulise.404768
AVG Win64:Evo-gen [Trj]
DeepInstinct MALICIOUS
alibabacloud Clean
No IRMA results available.