Static | ZeroBOX

PE Compile Time

2020-04-18 18:43:15

PE Imphash

f5d92ac0effe173d3e5e5087bab884e9

PEiD Signatures

Armadillo v1.71

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00009de5 0x0000a000 6.27967126845
.rdata 0x0000b000 0x000025c6 0x00003000 4.35146045845
.data 0x0000e000 0x00000998 0x00001000 3.06291417807
.rsrc 0x0000f000 0x00000450 0x00001000 1.12704321476

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0000f060 0x000003ec LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data

Imports

Library WS2_32.dll:
0x40b3fc getsockname
0x40b400 gethostname
0x40b404 send
0x40b408 closesocket
0x40b40c recv
0x40b410 select
0x40b414 socket
0x40b418 gethostbyname
0x40b41c htons
0x40b420 connect
0x40b424 setsockopt
0x40b428 WSAIoctl
0x40b42c WSACleanup
0x40b430 WSAStartup
Library SHLWAPI.dll:
0x40b2ec SHDeleteKeyA
Library MSVCRT.dll:
0x40b234 _strnicmp
0x40b238 ??2@YAPAXI@Z
0x40b23c ??3@YAXPAX@Z
0x40b240 __CxxFrameHandler
0x40b244 memmove
0x40b248 ceil
0x40b24c _ftol
0x40b250 strstr
0x40b254 _CxxThrowException
0x40b258 strchr
0x40b25c malloc
0x40b260 free
0x40b264 _except_handler3
0x40b268 strrchr
0x40b26c strncat
0x40b270 realloc
0x40b274 _beginthreadex
0x40b27c _exit
0x40b280 _XcptFilter
0x40b284 exit
0x40b288 _acmdln
0x40b28c __getmainargs
0x40b290 _initterm
0x40b294 __setusermatherr
0x40b298 _adjust_fdiv
0x40b29c __p__commode
0x40b2a0 __p__fmode
0x40b2a4 __set_app_type
0x40b2a8 _controlfp
0x40b2ac _strcmpi
Library KERNEL32.dll:
0x40b0b4 VirtualAlloc
0x40b0b8 ResetEvent
0x40b0bc InterlockedExchange
0x40b0c0 CancelIo
0x40b0c4 Sleep
0x40b0c8 lstrlenA
0x40b0d0 lstrcatA
0x40b0d4 lstrcpyA
0x40b0dc FreeLibrary
0x40b0e0 GetProcAddress
0x40b0e4 LoadLibraryA
0x40b0e8 MultiByteToWideChar
0x40b0ec CreateThread
0x40b0f0 lstrcmpA
0x40b0f8 GetVersionExA
0x40b0fc DeleteFileA
0x40b100 GetLastError
0x40b104 CreateDirectoryA
0x40b108 GetFileAttributesA
0x40b10c CreateProcessA
0x40b110 GetDriveTypeA
0x40b114 GetDiskFreeSpaceExA
0x40b120 FindClose
0x40b124 LocalFree
0x40b128 FindNextFileA
0x40b12c LocalReAlloc
0x40b130 FindFirstFileA
0x40b134 LocalAlloc
0x40b138 RemoveDirectoryA
0x40b13c GetFileSize
0x40b140 CreateFileA
0x40b144 ReadFile
0x40b148 SetFilePointer
0x40b14c WriteFile
0x40b150 MoveFileA
0x40b154 GetModuleFileNameA
0x40b15c GetCurrentProcess
0x40b160 CreateRemoteThread
0x40b164 WriteProcessMemory
0x40b168 VirtualAllocEx
0x40b16c OpenProcess
0x40b170 MoveFileExA
0x40b174 GetLocalTime
0x40b17c GetTickCount
0x40b180 GlobalFree
0x40b184 GlobalUnlock
0x40b188 GlobalLock
0x40b18c GlobalAlloc
0x40b190 GlobalSize
0x40b194 GetStartupInfoA
0x40b198 CreatePipe
0x40b19c DisconnectNamedPipe
0x40b1a0 TerminateProcess
0x40b1a4 PeekNamedPipe
0x40b1ac OutputDebugStringA
0x40b1b0 ResumeThread
0x40b1b4 GetSystemInfo
0x40b1b8 SetErrorMode
0x40b1bc LocalSize
0x40b1c0 Process32Next
0x40b1c4 Process32First
0x40b1cc lstrcmpiA
0x40b1d0 GetCurrentThreadId
0x40b1d4 GetModuleHandleA
0x40b1d8 SetEvent
0x40b1dc WaitForSingleObject
0x40b1e0 TerminateThread
0x40b1e4 CloseHandle
0x40b1e8 CreateEventA
0x40b1ec VirtualFree
0x40b1f4 GetSystemDirectoryA
0x40b1fc WideCharToMultiByte
Library USER32.dll:
0x40b2f4 keybd_event
0x40b2f8 MapVirtualKeyA
0x40b2fc SetCapture
0x40b300 WindowFromPoint
0x40b304 SetCursorPos
0x40b308 mouse_event
0x40b30c IsWindow
0x40b310 CloseWindow
0x40b314 CreateWindowExA
0x40b318 PostMessageA
0x40b31c OpenDesktopA
0x40b320 GetThreadDesktop
0x40b328 OpenInputDesktop
0x40b32c SendMessageA
0x40b330 CloseDesktop
0x40b334 EnumWindows
0x40b338 IsWindowVisible
0x40b340 ExitWindowsEx
0x40b344 GetCursorPos
0x40b348 GetCursorInfo
0x40b34c ReleaseDC
0x40b350 GetDesktopWindow
0x40b354 GetDC
0x40b358 SetRect
0x40b35c GetSystemMetrics
0x40b360 GetClipboardData
0x40b364 OpenClipboard
0x40b36c DispatchMessageA
0x40b370 TranslateMessage
0x40b374 EmptyClipboard
0x40b378 wsprintfA
0x40b37c GetMessageA
0x40b380 CharNextA
0x40b384 GetWindowTextA
0x40b388 LoadCursorA
0x40b38c DestroyCursor
0x40b390 SetThreadDesktop
0x40b394 BlockInput
0x40b398 SetClipboardData
0x40b39c CloseClipboard
Library GDI32.dll:
0x40b090 DeleteDC
0x40b094 DeleteObject
0x40b098 CreateCompatibleDC
0x40b09c CreateDIBSection
0x40b0a0 BitBlt
0x40b0a4 GetDIBits
0x40b0a8 SelectObject
Library ADVAPI32.dll:
0x40b004 QueryServiceStatus
0x40b008 ControlService
0x40b00c DeleteService
0x40b010 CloseServiceHandle
0x40b014 RegOpenKeyExA
0x40b018 OpenServiceA
0x40b01c OpenSCManagerA
0x40b020 RegSetValueExA
0x40b024 IsValidSid
0x40b028 LookupAccountNameA
0x40b02c LsaOpenPolicy
0x40b030 LsaFreeMemory
0x40b034 RegCloseKey
0x40b038 RegQueryValueA
0x40b03c GetTokenInformation
0x40b040 LookupAccountSidA
0x40b044 RegCreateKeyExA
0x40b048 RegDeleteKeyA
0x40b04c RegDeleteValueA
0x40b050 RegEnumKeyExA
0x40b054 RegEnumValueA
0x40b058 OpenProcessToken
0x40b064 OpenEventLogA
0x40b068 ClearEventLogA
0x40b06c CloseEventLog
0x40b070 RegOpenKeyA
0x40b074 RegQueryValueExA
0x40b078 LsaClose
Library SHELL32.dll:
0x40b2e0 SHGetFileInfoA
Library WINMM.dll:
0x40b3b8 waveInOpen
0x40b3bc waveInPrepareHeader
0x40b3c0 waveInAddBuffer
0x40b3c4 waveInStart
0x40b3c8 waveOutWrite
0x40b3cc waveInGetNumDevs
0x40b3d0 waveInReset
0x40b3d8 waveInClose
0x40b3dc waveOutReset
0x40b3e8 waveOutOpen
0x40b3ec waveOutGetNumDevs
0x40b3f0 waveInStop
0x40b3f4 waveOutClose
Library WININET.dll:
0x40b3a4 InternetOpenUrlA
0x40b3a8 InternetReadFile
0x40b3ac InternetCloseHandle
0x40b3b0 InternetOpenA
Library AVICAP32.dll:
Library MSVFW32.dll:
0x40b2b4 ICClose
0x40b2c0 ICCompressorFree
0x40b2c4 ICSeqCompressFrame
0x40b2c8 ICOpen
0x40b2cc ICSendMessage
Library PSAPI.DLL:
0x40b2d8 EnumProcessModules
Library WTSAPI32.dll:
0x40b438 WTSFreeMemory

!This program cannot be run in DOS mode.
`.rdata
@.data
V@j QR
GD]_[Y
L$$j\Q
tJ<\u8
D$lRPj
D$(RPj
L$4QRRRRRU
<AtG<BtC
D$$RPU
|$<.tK
D$<PVh\
D$\PWVh
L$0Ph0
L$0Ph0
QRPPPPPPVP
|$`j/W
T$dQRP
T$ QRj
D$TSUVW
NDSUPQ
FhURUPQ
l$(VW3
~0;~,}
VDPQRUSP
NPRPUSj
L$@_^][d
|$$MZu'
D$,RPQ
L$@jdQV
D$ IV32
D$$MP42
D$(cvid
Phvidc
WSAIoctl
WS2_32.dll
SHDeleteKeyA
SHLWAPI.dll
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
memmove
strstr
_CxxThrowException
strchr
malloc
_except_handler3
strrchr
strncat
realloc
_beginthreadex
MSVCRT.dll
??1type_info@@UAE@XZ
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
CreateEventA
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
InterlockedExchange
CancelIo
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
lstrcpyA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetModuleFileNameA
GetSystemDirectoryA
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
MoveFileExA
GetLocalTime
ExpandEnvironmentStringsA
GetTickCount
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
OutputDebugStringA
GlobalMemoryStatusEx
GetSystemInfo
SetErrorMode
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
GetModuleHandleA
KERNEL32.dll
DispatchMessageA
TranslateMessage
GetMessageA
wsprintfA
CharNextA
GetWindowTextA
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
PostMessageA
CreateWindowExA
CloseWindow
IsWindow
USER32.dll
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
GDI32.dll
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
LookupAccountSidA
GetTokenInformation
ADVAPI32.dll
SHGetSpecialFolderPathA
SHGetFileInfoA
SHELL32.dll
waveOutClose
waveOutUnprepareHeader
waveOutReset
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveOutWrite
waveInStart
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
WINMM.dll
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
MSVCP60.dll
IMM32.dll
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
WININET.dll
capGetDriverDescriptionA
capCreateCaptureWindowA
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
AVICAP32.dll
MSVFW32.dll
GetModuleFileNameExA
EnumProcessModules
PSAPI.DLL
WTSFreeMemory
WTSQuerySessionInformationA
WTSAPI32.dll
_strnicmp
_strcmpi
bad Allocate
bad buffer
Microsoft\Network\Connections\pbk\rasphone.pbk
\Application Data\Microsoft\Network\Connections\pbk\rasphone.pbk
Documents and Settings\
ConvertSidToStringSidA
advapi32.dll
L$_RasDefaultCredentials#0
RasDialParams!%s#0
Device
PhoneNumber
DialParamsUID
WinSta0\Default
%s\shell\open\command
%s\*.*
%s%s%s
%s%s*.*
SYSTEM\CurrentControlSet\Services\%s
SYSTEM\CurrentControlSet\Services\
\flyboy.dat
Gh0st Update
Applications\iexplore.exe\shell\open\command
System
Security
Application
SeDebugPrivilege
CloseHandle
kernel32.dll
SHDeleteKeyA
shlwapi.dll
CloseServiceHandle
DeleteService
StartServiceA
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
\flyboy.log
%d%d%d%d%d%d.bak
PPPPPP
REG_BINARY
%-24s %-15s
REG_MULTI_SZ
%-24s %-15s 0x%x(%d)
REG_DWORD
%-24s %-15s %s
REG_EXPAND_SZ
REG_SZ
\cmd.exe
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
HARDWARE\DESCRIPTION\System\CentralProcessor\0
tw2.exe
wow.exe
QQhxgame.exe
xy3.exe
xy2.exe
dnf.exe
mdm365.exe
dp.exe
my.exe
ashDisp.exe
avcenter.exe
TMBMSRV.exe
knsdtray.exe
kxetray.exe
egui.exe
Mcshield.exe
360sd.exe
RavMonD.exe
KvMonXP.exe
avp.exe
360tray.exe
WWWWWW
VVVVVV
121.196.49.217
SeShutdownPrivilege
explorer.exe
Winlogon
Mozilla/4.0 (compatible)
CVideoCap
#32770
.?AVtype_info@@
jjjjjj
jjjjjjjjh
VS_VERSION_INFO
StringFileInfo
080404b0
Comments
CompanyName
Microsoft Corporation
FileDescription
Device Protect Application
FileVersion
3, 6, 0, 0
InternalName
Microsoft(R) Windows(R) Operating System
LegalCopyright
Copyright ? 2008
LegalTrademarks
OriginalFilename
svchost.dll
PrivateBuild
ProductName
Microsoft(R) Windows(R) Operating System
ProductVersion
3, 6, 0, 0
SpecialBuild
VarFileInfo
Translation
Antivirus Signature
Lionic Trojan.Win32.Zegost.4!c
tehtris Clean
Cynet Malicious (score: 100)
CMC Clean
CAT-QuickHeal Backdoor.Farfli.20223
Skyhigh BehavesLike.Win32.Infected.km
ALYac Gen:Trojan.Redosdru.!o!.1
Cylance Unsafe
Zillya Dialer.NEH.Win32.338
Sangfor Trojan.Win32.Dialer.NEH
CrowdStrike win/malicious_confidence_100% (W)
Alibaba Backdoor:Win32/Zegost.45627b24
K7GW Dialer ( 000096541 )
K7AntiVirus Dialer ( 000096541 )
huorong Trojan/Agent.aoo
Baidu Win32.Trojan.Farfli.ai
VirIT Clean
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Dialer.NEH
APEX Clean
Avast Win32:Agent-BADD [Trj]
ClamAV Win.Trojan.Farfli-9822376-0
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Gen:Trojan.Redosdru.!o!.1
NANO-Antivirus Trojan.Win32.Zegost.hjskth
ViRobot Clean
MicroWorld-eScan Gen:Trojan.Redosdru.!o!.1
Tencent Backdoor.Win32.Gh0st.g
Sophos Mal/Behav-170
F-Secure Backdoor.BDS/Zegost.ukva
DrWeb BackDoor.Siggen.52105
VIPRE Gen:Trojan.Redosdru.!o!.1
TrendMicro BKDR_FARFLI.SMQ
McAfeeD Real Protect-LS!99E291C244C7
Trapmine suspicious.low.ml.score
CTX exe.trojan.zegost
Emsisoft Gen:Trojan.Redosdru.!o!.1 (B)
Ikarus Backdoor.Win32.Zegost
FireEye Generic.mg.99e291c244c7c4bc
Jiangmin Heur:Trojan/AntiAV
Varist W32/OnlineGames.BX.gen!Eldorado
Avira BDS/Zegost.ukva
Fortinet W32/Agent.D444!tr
Antiy-AVL Clean
Kingsoft malware.kb.a.1000
Gridinsoft Trojan.Win32.Gen.tr
Xcitium TrojWare.Win32.Magania.~AAD@f80tc
Arcabit Trojan.Redosdru.!o!.1
SUPERAntiSpyware Trojan.Agent/Gen-WebGame
ZoneAlarm UDS:DangerousObject.Multi.Generic
Microsoft Backdoor:Win32/Zegost.AD
Google Detected
AhnLab-V3 Trojan/Win32.OnlineGameHack.R13673
Acronis Clean
McAfee GenericRXEN-QM!99E291C244C7
TACHYON Clean
VBA32 BScope.Backdoor.Zegost
Malwarebytes Clean
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall BKDR_FARFLI.SMQ
Rising Backdoor.Farfli!1.6531 (CLASSIC)
Yandex Dialer.Agent!kLzn681U3sM
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.7164915.susgen
GData Gen:Trojan.Redosdru.!o!.1
AVG Win32:Agent-BADD [Trj]
DeepInstinct MALICIOUS
alibabacloud Backdoor:Win/Gh0st.DC(dyn)
No IRMA results available.