Static | ZeroBOX

PE Compile Time

1992-06-20 07:22:17

PE Imphash

042f854aa40eb5213ffd940a2e18951a

PEiD Signatures

UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
0x00001000 0x00016000 0x00000000 0.0
.rdata 0x00017000 0x0000e000 0x0000e000 7.93142939566
.rsrc 0x00025000 0x00001000 0x00000800 2.75988185912

Resources

Name Offset Size Language Sub-language File type
RT_BITMAP 0x0001d2dc 0x00004500 LANG_UKRAINIAN SUBLANG_DEFAULT data
RT_ICON 0x000252e0 0x000002e8 LANG_RUSSIAN SUBLANG_RUSSIAN data
RT_STRING 0x000222b8 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_STRING 0x000222b8 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_STRING 0x000222b8 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_STRING 0x000222b8 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_STRING 0x000222b8 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_STRING 0x000222b8 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_RCDATA 0x0002257c 0x000000f8 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_RCDATA 0x0002257c 0x000000f8 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x000255cc 0x00000014 LANG_RUSSIAN SUBLANG_RUSSIAN data

Imports

Library KERNEL32.DLL:
0x42566c LoadLibraryA
0x425670 GetProcAddress
0x425674 ExitProcess
Library advapi32.dll:
0x42567c RegCloseKey
Library gdi32.dll:
0x425684 SetROP2
Library msvcrt.dll:
0x42568c memset
Library oleaut32.dll:
0x425694 SysFreeString
Library user32.dll:
0x42569c GetDC

This program must be run under Win32
.rdata
Cardinal
TObject
J5m{{{
URum69
8S(@N
XC=Wr/
$xtZXtU0
~KxI[)
<Gv}FD
IxZ@`
SOFTWARE\Borland\Delphi\RTL
askValue
X%(v).
'$ZTUWVSA
^_F`1
N"+8AT
;6Q_DZ
t3< M<
,U;*ta h\
JO8|"G
I'?:CO6T
a^@_?@
l32.dll
GetLongPathNameA
oftwarew
Qcales
HpM7dJ
5[Q"5
a0O\Bc
'sSI88
AqZR X
P`CuX:F
.;-uA|H
ShbpPX
`nC W$
x8\CD
og<T%8
7ZV|"S
fjti7F
v(K#S)>R
/1t1Bt
HKYa0KUk*
!WAQ8C
C1@tDH
sRBRg`
AlCEWV
@*[$bY
I3H2HPN
a;cjNdeA
Exceptiont[gW
EHeapZ
EOutOfMemorys,
EIn]Err[
EDivByZero
EC%PvH
otjlCk@x
oSafecal
SysU 9[
0r=<9w9i
w)A->
CDHetY,cg
#9l@*r
M6@7AP
SU<HtH
[6FH[[
}Kh#hh
gDiskFreeSpacU
4MDDT<
lN6Tdd
VzC'>V
v#8{qHp6!
281474976710656[
857093779
!xVf93t$
D.J9FSP
$|q4Y,F
8(_I><'
>L.26:
Fi4TmB
ZretNi
;*uTTTT
fLLLLL
0"`B5w
(9T8 )
8(\2e\\
30"(@C~q
>EzoTT(<M
$D!QQro
dJTdLr
104560
r@34220
74118\X
p,!omL
J&$0l3
!Adobe C
2 ---OSCARia#
7
nswer Code:
Requesb?Y
/pplicD
W#PhoH
gSeT Numb
9 lemi% ;
EdiC"+Sj
~ndart,
2o\rV0
3456789ABCDEF
MS Sans f$
SELF_wP
_STATIC
i08@HP
;3+#>6.&
'2, /+0&7!4-)
_w76ld
3/#Cg1
0563429781
487063259*+
uD y7
w&g17S*k
OK__^qqK.`
fSgVxx9UV[:8Tl
NRNNQR
.G@7*7
B5AH4!
!$e!!%A
h8UxWYW;+;l
(NM/L
_'&\_.%
7DwW6+CVZ
GXMM(0_
`*`4Li
o]_o`ru
L~T&Tso(_
}0=I\G
{g{}yA;
|zxC;AD0lT]]E
N\1I'F@
hFg}H|};6X~
K\\I%.
}E}|y;>
+4FBE|x
g75J6w
<iiFDDBBCw
1!K66!0
.(Kc.<T1
JB'`0!5&[
lS}8@w
MQ312'e
2111L2
Vz>*9>VgF>h
Q,T8S8
~>5+Yy
[]l<VeS::WUc
U"9dF{V*.MgSG
&:C6;B
vN&-e}
XjSNoP\
e@)+K4
UWkZ8:
I-<`>+:G
6#;[yYW
hWCMKu
45w}zv
T<++;v:
dS@>=Se
E9w||g
d,,eE,.Tl
+9)"6^h
;:#!7V
K"*5F&rm
+)?m?&dfhZ
[T[nYFUK
q"&!$Wy
X9$EM}?*c
l\tt^ks`<
/UM XwY
sS].&U
*C)&F7)
k_0I'u
f.mClr
>?o_(m|V
#WAR*#+
=_=0-=gG8
\cLGav
;&pvQ;Y:
5IC@wTTn
a^_srltl^e
o';5$$X|
mkf\_&
'&N)Izjj.'
~T:ZYUL+")Z
.drkidd<)x?
U*!"7X
*,`85S,>.@??jd_d
Vyh8"5+583
h5!5DyXW](-
<l[,t,4
mUm7ZZ+;P
J"\f|*
ffT=='
e&,@@"
$EBEFh
B$PFuv^l
x.\e.,'/
xFmh7[8[
z5$46HwA6X
2'-Hoz
(`0._s
;rhg|wwxAUm
|68T_m
\>99+X
^=.K9h
7]*`j$
BAHHA%
Czyzxs
*8N644A
94$GC4%4
o|I?=^
,f??d@.`@
++95#A
id?X@6D
h+>Xh.A
~@g.@t
897:@Sl
tfkrjQ
D7D}g}B))J-Ii7Z`
!G$GGFJj{
0K'IIGu
^v5D@r)
LVTf[xX
zg9Gg\@8Fdi
?#*I|mi
HxKM|K
yojzjw
~]I8rF
F'HFWhm
\@?8g=
-b~UX#
>LWL`aKmK
LRQMQL
0(-KT-J
!f24q?
/p~XiV
m[HQe-
 / 
Ru<t'
[;l3"H
(/LNP
x'u/fbt
vctMp]{xD
!ekOkc
37mmDlg
(ShlObj%s
*ellAPI
e3[X?me
VirtualQuery
Pr+Addr
k5i/KT!
id,h/ToM
BrushOrg
pLl6VWh
tIaXWh
cu#'sk+f
eekOff3R
XXl+QN;
# wDAT
KERNEL32.DLL
advapi32.dll
gdi32.dll
msvcrt.dll
oleaut32.dll
user32.dll
LoadLibraryA
GetProcAddress
ExitProcess
RegCloseKey
SetROP2
memset
SysFreeString
DVCLAL
PACKAGEINFO
MAINICON
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Worm.Win32.Viking.lz9q
tehtris Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Hacktool.Keygen.21907
Skyhigh BehavesLike.Win32.AdwareClickSpring.qc
ALYac Misc.Keygen
Cylance Unsafe
Zillya Clean
Sangfor Trojan.Win32.Skeeyah.Vn22
K7AntiVirus Clean
Alibaba Clean
K7GW Clean
Cybereason Clean
huorong Clean
Baidu Clean
VirIT Backdoor.Win32.Generic.PVV
Paloalto Clean
Symantec Backdoor.Mosuck
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Keygen.AO potentially unsafe
APEX Malicious
Avast Clean
Cynet Malicious (score: 100)
Kaspersky Clean
BitDefender Clean
NANO-Antivirus Clean
ViRobot Keygen.59904
MicroWorld-eScan Clean
Tencent Clean
TACHYON Backdoor/W32.MoSucker.59904
Sophos Keygen (PUA)
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro CRCK_ADOBECS.A
McAfeeD ti!7B2CAA501764
Trapmine malicious.high.ml.score
FireEye Generic.mg.ed8c78a13d8e1f2f
Emsisoft Clean
Ikarus Trojan.Crypt
GData Clean
Jiangmin Clean
Webroot W32.Malware.gen
Varist W32/Backdoor.HTON-3338
Avira Clean
Antiy-AVL RiskWare/Win32.KeyGen
Kingsoft Win32.Troj.Undef.a
Gridinsoft Malware.Win32.Gen.bot!se62747
Xcitium Application.Win32.Hacktool.Keygen@133zf
Arcabit Clean
SUPERAntiSpyware Hack.Tool/Gen-KeyGen
ZoneAlarm Clean
Microsoft HackTool:Win32/Keygen!pz
Google Detected
AhnLab-V3 Unwanted/Win32.Keygen.R4441
Acronis Clean
McAfee Crack-Adobesuite
MAX malware (ai score=99)
VBA32 Trojan.Wacatac
Malwarebytes Keygen.CrackTool.RiskWare.DDS
Panda Clean
Zoner Clean
TrendMicro-HouseCall CRCK_ADOBECS.A
Rising Trojan.Skeeyah!8.3A6 (CLOUD)
Yandex Trojan.GenAsa!sfYSO2vrum0
SentinelOne Static AI - Suspicious PE
MaxSecure Trojan.Malware.1528796.susgen
Fortinet Crackin.EBBA9CBC
BitDefenderTheta Gen:NN.ZelphiF.36810.dmGfaWC33Pic
AVG Clean
DeepInstinct MALICIOUS
CrowdStrike win/grayware_confidence_90% (D)
alibabacloud Trojan:Win/Keygen.AO
No IRMA results available.