Static | ZeroBOX

PE Compile Time

2025-02-24 13:48:01

PE Imphash

351fbae162a7dacb0ecda3be35f09973

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0001c0be 0x0001c200 6.4429659559
.rdata 0x0001e000 0x000031c0 0x00003200 5.67019009369
.data 0x00022000 0x00002060 0x00001800 1.61856086117
.00cfg 0x00025000 0x00000008 0x00000200 0.0611628522412
.CRT 0x00026000 0x00000004 0x00000200 0.0611628522412
.rsrc 0x00027000 0x000001a8 0x00000200 4.1835699514
.reloc 0x00028000 0x00000fd0 0x00001000 6.70166454885

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x00027060 0x00000143 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document, ASCII text

Imports

Library msvcrt.dll:
0x420278 ??2@YAPAXI@Z
0x42027c ??3@YAXPAX@Z
0x420280 ??_U@YAPAXI@Z
0x420284 ??_V@YAXPAX@Z
0x420288 _splitpath
0x42028c atexit
0x420290 free
0x420294 isupper
0x420298 malloc
0x42029c memchr
0x4202a0 memcmp
0x4202a4 memcpy
0x4202a8 memmove
0x4202ac memset
0x4202b0 rand
0x4202b4 srand
0x4202b8 strchr
0x4202bc strcpy
0x4202c0 strcpy_s
0x4202c4 strlen
0x4202c8 strncpy
0x4202cc strstr
0x4202d0 strtok_s
Library KERNEL32.dll:
0x4202d8 CloseHandle
0x4202dc CopyFileA
0x4202e0 CreateDirectoryA
0x4202e4 CreateEventA
0x4202e8 CreateFileA
0x4202ec CreateProcessA
0x4202f0 CreateThread
0x4202f8 DeleteFileA
0x4202fc ExitProcess
0x420308 FindClose
0x42030c FindFirstFileA
0x420310 FindNextFileA
0x420314 GetComputerNameA
0x420318 GetComputerNameW
0x42031c GetCurrentProcessId
0x420320 GetDriveTypeA
0x420328 GetFileAttributesA
0x420330 GetFileSize
0x420334 GetFileSizeEx
0x420338 GetFileType
0x42033c GetFullPathNameA
0x420340 GetLastError
0x420344 GetLocalTime
0x420348 GetLocaleInfoA
0x420354 GetModuleFileNameA
0x420358 GetProcAddress
0x42035c GetProcessHeap
0x420360 GetSystemInfo
0x420364 GetSystemTime
0x420368 GetTempPathW
0x42036c GetTickCount
0x420380 GlobalAlloc
0x420384 GlobalFree
0x420388 GlobalLock
0x420390 GlobalSize
0x420394 HeapAlloc
0x420398 HeapFree
0x4203a0 LoadLibraryW
0x4203a4 LocalAlloc
0x4203a8 LocalFree
0x4203ac OpenEventA
0x4203b0 OpenProcess
0x4203b4 Process32First
0x4203b8 Process32Next
0x4203bc RaiseException
0x4203c0 ReadFile
0x4203c4 ReadProcessMemory
0x4203c8 SetFilePointer
0x4203cc Sleep
0x4203d4 TerminateProcess
0x4203d8 VirtualQueryEx
0x4203dc WaitForSingleObject
0x4203e0 WriteFile
0x4203e4 lstrcatA
0x4203e8 lstrcpyA
0x4203ec lstrlenA
0x4203f0 lstrlenW
Library ADVAPI32.dll:
0x4203fc GetUserNameA
0x420400 GetUserNameW
0x420404 RegCloseKey
0x420408 RegEnumKeyExA
0x42040c RegGetValueA
0x420410 RegOpenKeyExA
0x420414 RegQueryValueExA
Library api-ms-win-crt-runtime-l1-1-0.dll:
Library USER32.dll:
0x420424 CharToOemA
0x420428 CloseDesktop
0x42042c CloseWindow
0x420430 CreateDesktopA
0x420434 EnumDisplayDevicesA
0x420438 GetDC
0x42043c GetDesktopWindow
0x420444 GetWindowRect
0x420448 OpenDesktopA
0x42044c ReleaseDC
0x420450 wsprintfA
0x420454 wsprintfW
Library api-ms-win-crt-stdio-l1-1-0.dll:
Library GDI32.dll:
0x420468 BitBlt
0x420470 CreateCompatibleDC
0x420474 CreateDCA
0x420478 DeleteObject
0x42047c GetDeviceCaps
0x420480 SelectObject
Library SHELL32.dll:
0x420488 SHFileOperationA
0x42048c SHGetFolderPathA
0x420490 ShellExecuteExA
0x420494 ShellExecuteExW
Library ole32.dll:
Library WS2_32.dll:
0x4204a8 WSACleanup
0x4204ac WSAStartup
0x4204b0 closesocket
0x4204b4 connect
0x4204b8 freeaddrinfo
0x4204bc getaddrinfo
0x4204c0 htons
0x4204c4 recv
0x4204c8 send
0x4204cc socket
Library SHLWAPI.dll:
0x4204d4 PathFileExistsA
0x4204d8 PathMatchSpecA
0x4204dc None
0x4204e0 None
0x4204e4 StrStrA
Library CRYPT32.dll:
0x4204f0 CryptUnprotectData
Library WININET.dll:
0x4204f8 HttpOpenRequestA
0x4204fc HttpQueryInfoA
0x420500 HttpSendRequestA
0x420504 InternetCloseHandle
0x420508 InternetConnectA
0x42050c InternetCrackUrlA
0x420510 InternetOpenA
0x420514 InternetOpenUrlA
0x420518 InternetReadFile
0x42051c InternetSetOptionA
Library bcrypt.dll:
0x420528 BCryptDecrypt
0x42052c BCryptDestroyKey
0x420538 BCryptSetProperty
Library dbghelp.dll:
0x420540 SymMatchString

!This program cannot be run in DOS mode.$
`.rdata
@.data
.00cfg
@.rsrc
@.reloc
fffff.
\$$ffff.
\$DPj:S
fffff.
fffff.
ffffff.
7ffffff.
VWSPh%
tPffffff.
D$dSVP
\$ VUW
ffffff.
ffffff.
l$0SVU
|$0SVW
fffff.
?ffffff.
fffff.
?fffff.
PQRWSUh
"ffff.
Nfffff.
|$(fff.
ffffff.
fffff.
rVfffff.
ffffff.
#ffff.
D$of /qf
fffff.
fffff.
f;4$t"
?ffff.
$ffffff.
fffff.
9\$(tj
A@SQPW
|$4+t$
fffff.
);W(s/
~LQRPWS
610a54a128d571f3dd7b6390eafc2bf8
\\Monero\\wallet0123456789
ChromeBuildTools
DPAPI0123456789ABCDEF
referenc
\\BraveWallet\\P
<unknown>
\\Discord\\token
approve_apri
& del /
/c timeout /t 11\Program
" & rd /s /q "C: & rd /s /q "C:\ProgramD
" & exit
Qkkbal
3333333333333333UUUUUUUUUUUUUUUU
{"id":1,"method":"Storage.getCookies"}
Security
History
Work Dir: In memory
SOFTWARE\Microsoft\Cryptography
firefox
%08lX%04lX%lu
_key.txt
Soft\Steam\steam_tokens.txt
passwords.txt
information.txt
WebSocketClient
" & exit
GdipGetImageHeight
GdipGetImagePixelFormat
N0ZWFt
Azure\.aws
status
Wallets
GdipGetImageEncoders
Software\Martin Prikryl\WinSCP 2\Sessions
Plugins
/devtools
prefs.js
\Local Extension Settings
\Sync Extension Settings
Cookies
Preferences
key_datas
%s\%s\%s
C:\ProgramData\%s\%s
path=%s, pluginName=%s, soft=%s, profile=%s
PortNumber
CurrentBuildNumber
GdiplusStartup
GdipCreateHBITMAPFromBitmap
Opera Crypto
Unknown
GdiplusShutdown
_logins.json
Unknown exception
invalid string position
Software\Martin Prikryl\WinSCP 2\Configuration
DisplayVersion
SOFTWARE\Microsoft\Windows NT\CurrentVersion
amcommunity.com
Telegram
Software\Valve\Steam
GdipSaveImageToStream
GdipLoadImageFromStream
\AppData\Roaming\FileZilla\recentservers.xml
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Network
profiles.ini
bad array new length
GdipGetImageWidth
wallet_path
SteamPath
screenshot.jpg
vector too long
string too long
ProcessorNameString
loginusers.vdf
libraryfolders.vdf
config.vdf
DialogConfig.vdf
DialogConfigOverlay*.vdf
GdipGetImageEncodersSize
steam.exe
C:\Windows\system32\cmd.exe
C:\Windows\system32\rundll32.exe
formhistory.sqlite
cookies.sqlite
places.sqlite
Local State
Azure\.azure
SOFTWARE\monero-project\monero-core
chrome
file_name
DisplayName
HostName
ProductName
UserName
GdipSaveImageToFile
msal.cache
GdipDisposeImage
Azure\.IdentityService
UseMasterPassword
MachineGuid
task_id
build_id
Disabled
%d/%d/%d %d:%d:%d
\Local Storage\leveldb
_0.indexeddb.leveldb
_formhistory.db
_history.db
_cookies.db
_passwords.db
_webdata.db
_key4.db
\key4.db
file_data
Login Data
Web Data
chrome-extension_
[Processes]
[Software]
\storage\default\
\.aws\
\Telegram Desktop\
\Steam\
\config\
\.azure\
Stable\
\.IdentityService\
\discord\
C:\ProgramData\
DISPLAY
Opera GX
\Local Storage\leveldb\CURRENT
dQw4w9WgXcQ
GdipCreateBitmapFromHBITMAP
\IndexedDB
OCALAPPDATA
<Host>
<Port>
<User>
<Pass encoding="base64">
http://localhost:
"webSocketDebuggerUrl":
^userContextId=4294967295
65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73
ws://localhost:9223
.metadata-v2
comctl32
Windows 11
HTTP/1.1
HARDWARE\DESCRIPTION\System\CentralProcessor\0
abcdefghijklmnopqrstuvwxyz1234567890
ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890
"ws://
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_.
Content-Type: multipart/form-data; boundary=----
------
moz-extension+++
F8806DD0C461824F*
D877F783D5D3EF8C*
A7FDF864FBC10B77*
A92DAA6EA6F891F2*
%s\*.*
*%DRIVE_REMOVABLE%*
*%DRIVE_FIXED%*
%RECENT%
%DOCUMENTS%
%PROGRAMFILES%
%DESKTOP%
%USERPROFILE%
%DRIVE_REMOVABLE%
%DRIVE_FIXED%
%LOCALAPPDATA%
%APPDATA%
%PROGRAMFILES_86%
--remote-debugging-port=9223 --profile-directory="
Content-Disposition: form-data; name="
"encrypted_key":"
Connection: Upgrade
Upgrade: websocket
Sec-WebSocket-Key:
HTTP/1.1
Host:
Windows:
Cores:
Keyboard Languages:
Threads:
Processor:
Display Resolution:
Version:
Login:
Path:
Install Date:
TimeZone:
Local Time:
Computer Name:
User Name:
Password:
VideoCard:
MachineID:
HWID:
GUID:
Soft: FileZilla
[Hardware]
Soft: WinSCP
Sec-WebSocket-Version: 13
??2@YAPAXI@Z
??3@YAXPAX@Z
??_U@YAPAXI@Z
??_V@YAXPAX@Z
_splitpath
atexit
isupper
malloc
memchr
memcmp
memcpy
memmove
memset
strchr
strcpy
strcpy_s
strlen
strncpy
strstr
strtok_s
CloseHandle
CopyFileA
CreateDirectoryA
CreateEventA
CreateFileA
CreateProcessA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
GetComputerNameA
GetComputerNameW
GetCurrentProcessId
GetDriveTypeA
GetEnvironmentVariableA
GetFileAttributesA
GetFileInformationByHandle
GetFileSize
GetFileSizeEx
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLocaleInfoA
GetLogicalDriveStringsA
GetLogicalProcessorInformationEx
GetModuleFileNameA
GetProcAddress
GetProcessHeap
GetSystemInfo
GetSystemTime
GetTempPathW
GetTickCount
GetTimeZoneInformation
GetVolumeInformationA
GetWindowsDirectoryA
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatusEx
GlobalSize
HeapAlloc
HeapFree
K32GetModuleFileNameExA
LoadLibraryW
LocalAlloc
LocalFree
OpenEventA
OpenProcess
Process32First
Process32Next
RaiseException
ReadFile
ReadProcessMemory
SetFilePointer
SystemTimeToFileTime
TerminateProcess
VirtualQueryEx
WaitForSingleObject
WriteFile
lstrcatA
lstrcpyA
lstrlenA
lstrlenW
GetCurrentHwProfileA
GetUserNameA
GetUserNameW
RegCloseKey
RegEnumKeyExA
RegGetValueA
RegOpenKeyExA
RegQueryValueExA
_invalid_parameter_noinfo_noreturn
CharToOemA
CloseDesktop
CloseWindow
CreateDesktopA
EnumDisplayDevicesA
GetDesktopWindow
GetKeyboardLayoutList
GetWindowRect
OpenDesktopA
ReleaseDC
wsprintfA
wsprintfW
__stdio_common_vsnprintf_s
__stdio_common_vsprintf
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
DeleteObject
GetDeviceCaps
SelectObject
SHFileOperationA
SHGetFolderPathA
ShellExecuteExA
ShellExecuteExW
CreateStreamOnHGlobal
GetHGlobalFromStream
freeaddrinfo
getaddrinfo
PathFileExistsA
PathMatchSpecA
StrStrA
CryptBinaryToStringA
CryptUnprotectData
HttpOpenRequestA
HttpQueryInfoA
HttpSendRequestA
InternetCloseHandle
InternetConnectA
InternetCrackUrlA
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetSetOptionA
BCryptCloseAlgorithmProvider
BCryptDecrypt
BCryptDestroyKey
BCryptGenerateSymmetricKey
BCryptOpenAlgorithmProvider
BCryptSetProperty
SymMatchString
msvcrt.dll
KERNEL32.dll
ADVAPI32.dll
api-ms-win-crt-runtime-l1-1-0.dll
USER32.dll
api-ms-win-crt-stdio-l1-1-0.dll
GDI32.dll
SHELL32.dll
ole32.dll
WS2_32.dll
SHLWAPI.dll
CRYPT32.dll
WININET.dll
bcrypt.dll
dbghelp.dll
https://t.me/l793oy
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
https://steamcommunity.com/profiles/76561199829660832
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
https://t.me/l793oy
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
https://steamcommunity.com/profiles/76561199829660832
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
https://t.me/l793oy
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
https://steamcommunity.com/profiles/76561199829660832
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
https://t.me/l793oy
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
.?AVbad_array_new_length@std@@
.?AVbad_alloc@std@@
.?AVexception@std@@
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVout_of_range@std@@
.?AVtype_info@@
<?xml version="1.0" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1"
manifestVersion="1.0">
<trustInfo>
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false'/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
0$030:0A0H0O0V0]0d0j0p0
1K1Y1k1v1
1'262X2
526\6z6
:B;N;l;
1-1;1B1N1
3?3[3w3
464R4n4
4/5@5Y5
7;7H7U7b7l7x7
9&:B:^:z:
;;;;W;
<1<U<r<
=-=G=X=
=+>C>J>[>h>
?\?i?v?
171B1I1s1}1
2%3A3u3
4 4-4Q4W4
5/5N5X5q5
6J6W67-7<7E7n7
9$9,939Z9n9
:0:?:J:
;%;,;8;
=:=V=r=
0&1@1M1k1
4/5-6?6w6
7/7C7W7p7
>1?U?`?f?
g0m0t0"1]1d2
9U:R=Y=_=
0]2d2k2|2
=/>>>]>
?6?T?n?
1;2P2s2
3"414S4
>#>7>U>]>o>|>
22&2Y2
89/9<9L9\9l9y9
1B2O2j2
5$535S5
8$808N8
1%1T1`1p1
2%2I2U2e2
475C5S5w5
556>6H6e8r8L9W9s9x9
9 :2:T:
<)<9<@<Z<a<
=T>a>n>{>
0&0N0U0`0
2f2p2w2
40676L7R7h8o8
<)<M<i<
4"4,4@4Y4c4}4
505g5q5
:1:<:O:Y:b:~:
;";5;<;Y;g;r;
<4<?<W<~<
<O=n=|=
?7?X?_?
3$3*383A3H3
5!5>5J5Z5k5
7V7k8x8
9#9)9/949=9C9I9N9W9]9c9h9q9w9}9
:%:+:1:6:C:I:O:T:a:g:m:r:
;";2;?;e;r;
<1<:<N<Y<
141[1m1
4'464?4b4o4|4
(0D0`0
7'7U7^7u7
5@6S6e6
0+080V0]0d0r0
2A3Q3X3
3=4M4T4
495I5P5
5M6W6^6
8#9*9?9j9
<I=P=^=
1!1E1M1Z1{1
1#353s3
778R9X9p9p;
0)000]0l0|0
2K3Q3m3
7*787F7T7b7w7
8K:\:d:l:t:
0>3Q3d3w3
3434Z4
<&<A<k=
[1Q2o2
3 3'3B3I3
? ?6?l?|?
0$0*00060<0B0H0N0T0Z0`0f0l0r0x0~0
1P2T2@4D4H4L4P4T4X4\4`4d4h4l4p4t4x4|4
4@<D<H<L<P<T<X<\<`<d<h<l<p<t<x<|<
<@=T=X=h=l=t=
> >0>4>D>H>L>T>l>|>
1 1(101D1L1T1\1`1d1l1
CRYPT32dll
Gdiplus.dll
image/jpeg
ChainingMode
ChainingModeGCM
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=
Antivirus Signature
Bkav W32.Common.1EBA0297
Lionic Trojan.Win32.Vidar.i!c
Elastic malicious (high confidence)
ClamAV Clean
CMC Clean
CAT-QuickHeal Trojan.Ghanarava.1741373570236c7f
Skyhigh BehavesLike.Win32.Generic.ch
ALYac Gen:Variant.Lazy.269754
Cylance Unsafe
Zillya Trojan.Vidar.Win32.954
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
Alibaba TrojanPSW:Win32/Vidar.ad34ef06
K7GW Trojan ( 005a977a1 )
K7AntiVirus Trojan ( 005a977a1 )
huorong TrojanSpy/Stealer.ou
Baidu Clean
VirIT Adware.Win32.Genus.HSY
Paloalto Clean
Symantec ML.Attribute.HighConfidence
tehtris Generic.Malware
ESET-NOD32 a variant of Win32/Vidar.A
APEX Malicious
Avast Win32:AdwareX-gen [Adw]
Cynet Malicious (score: 100)
Kaspersky Trojan-PSW.Win32.Vidar.deq
BitDefender Gen:Variant.Lazy.269754
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.Lazy.269754
Tencent Trojan-Banker.Win32.Bandra.16000514
Sophos Mal/Generic-S
F-Secure Trojan.TR/AVI.vidar.tcybl
DrWeb Clean
VIPRE Gen:Variant.Lazy.269754
TrendMicro Clean
McAfeeD Real Protect-LS!DA8846245FB9
Trapmine malicious.moderate.ml.score
CTX exe.trojan.vidar
Emsisoft Gen:Variant.Lazy.269754 (B)
Ikarus Clean
FireEye Generic.mg.da8846245fb9ec49
Jiangmin Clean
Webroot Win.Infostealer.Vidar
Varist Clean
Avira TR/AVI.vidar.tcybl
Fortinet Clean
Antiy-AVL GrayWare/Win32.Wacapew
Kingsoft Win32.Trojan-PSW.Vidar.deq
Gridinsoft Spy.Win32.Vidar.tr
Xcitium Clean
Arcabit Trojan.Lazy.D41DBA
SUPERAntiSpyware Clean
Microsoft Trojan:Win32/Wacatac.B!ml
Google Detected
AhnLab-V3 Adware/Win.Generic.C5733986
Acronis Clean
McAfee Artemis!DA8846245FB9
TACHYON Clean
VBA32 TrojanPSW.Vidar
Malwarebytes Trojan.Vidar
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Stealer.Vidar!1.11757 (CLASSIC)
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.7164915.susgen
GData Gen:Variant.Lazy.269754
AVG Win32:AdwareX-gen [Adw]
DeepInstinct MALICIOUS
alibabacloud Trojan[stealer]:Win/Vidar.A
No IRMA results available.