Static | ZeroBOX

PE Compile Time

2019-07-30 17:52:21

PE Imphash

a50e815adb2cfe3e58d388c791946db8

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
UPX0 0x00001000 0x00017000 0x00000000 0.0
UPX1 0x00018000 0x0000e000 0x0000d400 7.98404548605
.rsrc 0x00026000 0x00001000 0x00000800 4.4001312712

Resources

Name Offset Size Language Sub-language File type
RT_RCDATA 0x00022240 0x00000902 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_RCDATA 0x00022240 0x00000902 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_RCDATA 0x00022240 0x00000902 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_RCDATA 0x00022240 0x00000902 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x00026220 0x000002a0 LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, ASCII text, with very long lines, with no line terminators

Imports

Library COMCTL32.DLL:
0x140026588 InitCommonControlsEx
Library GDI32.DLL:
0x140026598 GetStockObject
Library KERNEL32.DLL:
0x1400265a8 LoadLibraryA
0x1400265b0 ExitProcess
0x1400265b8 GetProcAddress
0x1400265c0 VirtualProtect
Library msvcrt.dll:
0x1400265d0 free
Library OLE32.DLL:
0x1400265e0 CoInitialize
Library SHELL32.DLL:
0x1400265f0 ShellExecuteExW
Library SHLWAPI.DLL:
0x140026600 PathRemoveArgsW
Library USER32.DLL:
0x140026610 SetFocus
Library WINMM.DLL:
0x140026620 timeBeginPeriod

!This program cannot be run in DOS mode.
NS=LiU"
Ef|IY"
&re1+
;fK-7M^w
m\]v'T
J3*)/z"
3uTt\V
']=$:#a
2DmMY
u]TU(2
\W<NsZ^
;K!4zl
SEleTz
@[D'tO
unOiWU
H&.ip)
t;/Iqm
~|1p&--
='v=bf
UjrT4{
]kcZ)P
Jf'BDf
?ayS)s
F"ESWmIx
u@o,Bf8
em@Mr)]C
Nt<UId
/?P 1]xb
u=U7xV
~ A!xrW
Y>N';y&
uea&oX
m!]Lhs
Am:uW.
G%JQAd
YoBxwf
X#87fQ
kAVNtg\
iFOUZ2
DrNays^r
bB]:]w
fcy`\dY
l<ks"o
50Tw#!6
eYS8X=AAR
"c1>uJ
a401($
N:F=hn
C r]g#
hzn!gQ
o"pz->9
YksF|eg
Kk_:v+
<\Y/B
/>QJ{D
KtHjLx
i{pjSlkj
6nh/UF2
Snr2x}j%
n*NoK\
Y/yuM$
7fJ#gU,
B'8,[tU
i@axo2
zIrWl)
adTZZS
zC#y,(S
T V+\L
zMoq4U~O
'tJ+])
y$3:"N=
q5K)&P
4LHnWo?
zJgwVQj
#xH*c$e
Bum&o.
z\TR3"
{(B'$Lu
Hg)7nb
xW[r8PS
/=v/o:
#1l$:Ju
i]&b5,
[]A\A]A^A_
(]_^[H
<?xml version="1.0" encoding="UTF-8" standalone="yes"?> <assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"> <dependency> <dependentAssembly> <assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="*" publicKeyToken="6595b64144ccf1df" language="*" /> </dependentAssembly> </dependency> <v3:trustInfo xmlns:v3="urn:schemas-microsoft-com:asm.v3"> <v3:security> <v3:requestedPrivileges> <!-- level can be "asInvoker", "highestAvailable", or "requireAdministrator" --> <v3:requestedExecutionLevel level="requireAdministrator" /> </v3:requestedPrivileges> </v3:security> </v3:trustInfo> </assembly>
COMCTL32.DLL
GDI32.DLL
KERNEL32.DLL
msvcrt.dll
OLE32.DLL
SHELL32.DLL
SHLWAPI.DLL
USER32.DLL
WINMM.DLL
InitCommonControlsEx
GetStockObject
ExitProcess
GetProcAddress
LoadLibraryA
VirtualProtect
CoInitialize
ShellExecuteExW
PathRemoveArgsW
SetFocus
timeBeginPeriod
2089BAF0CD(27936A40688A4F7CFE2BEC0A970AB59560884266 C6FD3A34689E980504CD44E2A430C089 FEF7504AD26B3FBFA5FD40CC1642ABAB
Antivirus Signature
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
Elastic malicious (moderate confidence)
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh BehavesLike.Win64.Generic.qc
ALYac Trojan.GenericKD.74521350
Cylance Unsafe
Zillya Clean
CrowdStrike win/malicious_confidence_70% (D)
Alibaba Clean
K7GW Clean
K7AntiVirus Clean
Baidu Clean
VirIT Trojan.Win64.Agent.CHMP
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
tehtris Generic.Malware
ESET-NOD32 Clean
APEX Malicious
Avast Win64:Evo-gen [Trj]
Cynet Malicious (score: 100)
Kaspersky Clean
BitDefender Trojan.GenericKD.74520337
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Trojan.GenericKD.74520337
Tencent Clean
Sophos Mal/Generic-S
F-Secure Clean
DrWeb Trojan.KillProc2.23824
VIPRE Clean
TrendMicro Clean
McAfeeD Real Protect-LS!09718D571B01
Trapmine Clean
CTX exe.trojan.generic
Emsisoft Trojan.GenericKD.74520337 (B)
huorong Clean
FireEye Generic.mg.09718d571b01cb93
Jiangmin Trojan.Alien.ga
Webroot Clean
Varist W64/Agent.CAU.gen!Eldorado
Avira Clean
Fortinet W64/Agent.4987!tr
Antiy-AVL Trojan/Win32.Phonzy
Kingsoft malware.kb.b.986
Gridinsoft Trojan.Win64.Agent.sa
Xcitium Malware@#36w60dwm4dpfh
Arcabit Trojan.Generic.D4711711
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Bankinc
Google Detected
AhnLab-V3 Malware/Win.Generic.R426832
Acronis Clean
McAfee Artemis!09718D571B01
TACHYON Clean
VBA32 Clean
Malwarebytes Generic.Malware.AI.DDS
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Clean
Rising Clean
Yandex Clean
Ikarus Trojan.PowerShell.Crypt
MaxSecure Trojan.Malware.300983.susgen
GData Trojan.GenericKD.74520337
AVG Win64:Evo-gen [Trj]
DeepInstinct MALICIOUS
alibabacloud Trojan:Win/Bankinc.Gen
No IRMA results available.