PE Compile Time

2006-08-16 00:40:48

PE Imphash

97e58f60d513fd55ab0fcf0d63373be5

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000a8b0 0x0000b000 5.36983605609
.data 0x0000c000 0x000014e0 0x00001000 0.0
.rsrc 0x0000e000 0x0000d9fc 0x0000d9fc 2.86196812302

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0000e2e0 0x00001ca8 LANG_NEUTRAL SUBLANG_NEUTRAL Device independent bitmap graphic, 48 x 96 x 24, image size 7296
RT_GROUP_ICON 0x0000e2cc 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x0000e0f0 0x000001dc LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library MSVBVM60.DLL:
0x401000 _CIcos
0x401004 _adj_fptan
0x401008 __vbaVarMove
0x40100c __vbaFreeVar
0x401010 __vbaLateIdCall
0x401014 __vbaLineInputStr
0x401018 __vbaLenBstr
0x40101c __vbaStrVarMove
0x401020 __vbaEnd
0x401024 __vbaFreeVarList
0x401028 _adj_fdiv_m64
0x40102c __vbaRaiseEvent
0x401030 __vbaNextEachVar
0x401034 __vbaLineInputVar
0x401038 __vbaFreeObjList
0x40103c _adj_fprem1
0x401040 __vbaRecAnsiToUni
0x401044 __vbaStrCat
0x401048 __vbaVarCmpNe
0x40104c __vbaLsetFixstr
0x401050 __vbaSetSystemError
0x401054 __vbaNameFile
0x40105c _adj_fdiv_m32
0x401060 __vbaExitProc
0x401064 __vbaVarForInit
0x401068 __vbaOnError
0x40106c __vbaObjSet
0x401070 _adj_fdiv_m16i
0x401074 _adj_fdivr_m16i
0x401078 None
0x40107c __vbaStrFixstr
0x401080 __vbaBoolVarNull
0x401084 _CIsin
0x401088 __vbaChkstk
0x40108c None
0x401090 __vbaFileClose
0x401094 EVENT_SINK_AddRef
0x401098 None
0x40109c __vbaGet3
0x4010a0 None
0x4010a4 __vbaStrCmp
0x4010a8 __vbaVarTstEq
0x4010ac __vbaR4Str
0x4010b0 __vbaObjVar
0x4010b4 DllFunctionCall
0x4010b8 __vbaVarLateMemSt
0x4010bc _adj_fpatan
0x4010c0 __vbaRecUniToAnsi
0x4010c4 EVENT_SINK_Release
0x4010c8 None
0x4010cc _CIsqrt
0x4010d0 __vbaVarAnd
0x4010d8 __vbaExceptHandler
0x4010dc __vbaStrToUnicode
0x4010e0 _adj_fprem
0x4010e4 _adj_fdivr_m64
0x4010e8 None
0x4010ec None
0x4010f0 __vbaFPException
0x4010f4 __vbaStrVarVal
0x4010f8 __vbaVarCat
0x4010fc __vbaI2Var
0x401100 None
0x401104 None
0x401108 _CIlog
0x40110c __vbaFileOpen
0x401110 None
0x401118 __vbaNew2
0x40111c None
0x401120 _adj_fdiv_m32i
0x401124 _adj_fdivr_m32i
0x401128 __vbaStrCopy
0x40112c __vbaFreeStrList
0x401130 None
0x401134 _adj_fdivr_m32
0x401138 _adj_fdiv_r
0x40113c None
0x401140 __vbaVarSetVar
0x401144 __vbaI4Var
0x401148 __vbaVarCmpEq
0x40114c __vbaVarAdd
0x401150 __vbaLateMemCall
0x401154 __vbaStrToAnsi
0x401158 __vbaVarDup
0x40115c __vbaVarMod
0x401160 __vbaVarCopy
0x401168 None
0x40116c _CIatan
0x401170 __vbaStrMove
0x401174 None
0x401178 __vbaForEachVar
0x40117c _allmul
0x401180 _CItan
0x401184 __vbaAryUnlock
0x401188 __vbaVarForNext
0x40118c _CIexp
0x401190 __vbaFreeStr
0x401194 __vbaFreeObj

!This program cannot be run in DOS mode.
MSVBVM60.DLL
RsaTQs
TQskcDs
QssADs
RsWVPs
RsmYOsKDs
`Os0XQsaUQs
Rsn[Ps
Ps[TPsp
QsFUDsX
ADstEDsb
UQsPOQs
Qs"DDsi
dungcoi
Bhtaaaqqq
;k{Ycfmmm
Qdjgggwww
Ifpdddqqq
Bht[ehnnn
;k{Rfljjj|||
Jgpqqq
Timer2
dungcoi.DL
dungcoi.DL
dungcoi.DL
dungcoi.DL
Timer1
dungcoi
dcDakNong
dungcoi
dungcoi.DL
Process
KeyScan
dungcoi
user32
GetPrivateProfileIntA
Timer2
C:\Program Files\Microsoft Visual Studio\VB98\VB6.OLB
Timer1
kernel32
PostMessageA
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateProcess
OpenProcess
CloseHandle
wininet.dll
InternetGetConnectedStateEx
DrawTextExA
SetTimer
KillTimer
GetAsyncKeyState
SetRect
advapi32.dll
RegCloseKey
RegCreateKeyA
RegSetValueExA
FindWindowA
__vbaNextEachVar
FindWindowExA
SendMessageA
VBA6.DLL
__vbaAryUnlock
__vbaVarCat
__vbaVarCmpNe
__vbaVarCmpEq
__vbaVarAnd
__vbaBoolVarNull
__vbaForEachVar
__vbaVarMod
__vbaI2Var
__vbaStrCmp
__vbaStrFixstr
__vbaRecAnsiToUni
__vbaRecUniToAnsi
__vbaVarTstEq
__vbaStrVarMove
__vbaFreeObjList
__vbaStrCat
__vbaStrMove
__vbaLenBstr
__vbaNew2
__vbaSetSystemError
__vbaVarForNext
__vbaObjVar
__vbaLateMemCall
__vbaLineInputStr
__vbaStrCopy
UserControl
__vbaVarLateMemSt
__vbaVarLateMemCallLdRf
__vbaVarForInit
__vbaVarLateMemCallLd
__vbaFreeVarList
__vbaExitProc
__vbaHresultCheckObj
__vbaVarAdd
__vbaVarSetVar
__vbaVarDup
__vbaLateIdCall
__vbaFreeVar
__vbaVarMove
__vbaFileClose
__vbaFreeObj
__vbaFreeStr
__vbaStrVarVal
__vbaObjSet
__vbaLineInputVar
__vbaFileOpen
__vbaFreeStrList
Download
__vbaOnError
__vbaStrToUnicode
__vbaStrToAnsi
__vbaGet3
butBDR
__vbaLsetFixstr
__vbaEnd
CancelDownload
Progress
Completed
__vbaR4Str
__vbaRaiseEvent
__vbaNameFile
__vbaVarCopy
__vbaI4Var
butBDR
sWWWFile
sDestination
DownLoadedBytes
TotalBytes
slfNf+u
KlfAQV
jXhxJ@
jXhxJ@
jXhxJ@
MSVBVM60.DLL
_CIcos
_adj_fptan
__vbaVarMove
__vbaFreeVar
__vbaLateIdCall
__vbaLineInputStr
__vbaLenBstr
__vbaStrVarMove
__vbaEnd
__vbaFreeVarList
_adj_fdiv_m64
__vbaRaiseEvent
__vbaNextEachVar
__vbaLineInputVar
__vbaFreeObjList
_adj_fprem1
__vbaRecAnsiToUni
__vbaStrCat
__vbaVarCmpNe
__vbaLsetFixstr
__vbaSetSystemError
__vbaNameFile
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaExitProc
__vbaVarForInit
__vbaOnError
__vbaObjSet
_adj_fdiv_m16i
_adj_fdivr_m16i
__vbaStrFixstr
__vbaBoolVarNull
_CIsin
__vbaChkstk
__vbaFileClose
EVENT_SINK_AddRef
__vbaGet3
__vbaStrCmp
__vbaVarTstEq
__vbaR4Str
__vbaObjVar
DllFunctionCall
__vbaVarLateMemSt
_adj_fpatan
__vbaRecUniToAnsi
EVENT_SINK_Release
_CIsqrt
__vbaVarAnd
EVENT_SINK_QueryInterface
__vbaExceptHandler
__vbaStrToUnicode
_adj_fprem
_adj_fdivr_m64
__vbaFPException
__vbaStrVarVal
__vbaVarCat
__vbaI2Var
_CIlog
__vbaFileOpen
__vbaVarLateMemCallLdRf
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
__vbaVarSetVar
__vbaI4Var
__vbaVarCmpEq
__vbaVarAdd
__vbaLateMemCall
__vbaStrToAnsi
__vbaVarDup
__vbaVarMod
__vbaVarCopy
__vbaVarLateMemCallLd
_CIatan
__vbaStrMove
__vbaForEachVar
_allmul
_CItan
__vbaAryUnlock
__vbaVarForNext
_CIexp
__vbaFreeStr
__vbaFreeObj
Bhtaaaqqq
;k{Ycfmmm
Qdjgggwww
Ifpdddqqq
Bht[ehnnn
;k{Rfljjj|||
Jgpqqq
_extentx
_extenty
_extentx
_extenty
_extentx
_extenty
_extentx
_extenty
@i.exe
@i.exe
@*\AD:\SourceDungcoi\Dung_DakNong.vbp
I am virus dungcoi by dungcoi
http://dungcoivb.googlepages.com/Fun.exe
http://dungcoivb.googlepages.com/ND.txt
http://dungcoivb.googlepages.com/NDM.txt
C:\WINDOWS\SVIQ.EXE
C:\WINDOWS\system\Fun.exe
C:\WINDOWS\dc.exe
C:\WINDOWS\VBit.ini
C:\WINDOWS\Winsit.ini
C:\WINDOWS\system32\Xpen.dat
C:\WINDOWS\system32\Penx.dat
Software\Microsoft\Windows\CurrentVersion\Run
CreateObject
GetNameSpace
AddressLists
AddressEntries
CreateItem
Subject
Attachments
Fun.exe
dc.exe
Scripting.FileSystemObject
Drives
DriveType
GetFolder
subfolders
imclass
yiminputwindow
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
040904B0
ProductName
dcDakNong
FileVersion
ProductVersion
InternalName
dungcoi
OriginalFilename
dungcoi.exe
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Clean
Elastic malicious (high confidence)
ClamAV Win.Worm.Sality-6823315-0
CMC Clean
CAT-QuickHeal Worm.Codungi.A6
Skyhigh BehavesLike.Win32.Generic.kt
ALYac Gen:Variant.Graftor.27488
Cylance Unsafe
Zillya Clean
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (D)
Alibaba Worm:Win32/YahLover.f0f3c42d
K7GW Clean
K7AntiVirus Clean
huorong TrojanDropper/Agent.fr
Baidu Win32.Trojan-Downloader.VB.b
VirIT Trojan.Win32.Citem.AKJ
Paloalto Clean
Symantec Trojan.Gen.MBT
tehtris Clean
ESET-NOD32 a variant of Win32/VB.OPS
APEX Malicious
Avast Win32:VB-GNM [Wrm]
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.Win32.Generic
BitDefender Gen:Variant.Graftor.27488
NANO-Antivirus Virus.Win32.Gen.ccmw
ViRobot Trojan.Win32.Agent.975360
MicroWorld-eScan Gen:Variant.Graftor.27488
Tencent Trojan.Win32.VB.tpa
Sophos Mal/Generic-S
F-Secure Clean
DrWeb Worm.Siggen.6336
VIPRE Gen:Variant.Graftor.27488
TrendMicro WORM_IMAUT.SME
McAfeeD Clean
Trapmine malicious.high.ml.score
CTX exe.unknown.graftor
Emsisoft Gen:Variant.Graftor.27488 (B)
Ikarus IM-Worm.Win32.VB
FireEye Generic.mg.39d244873d52a06b
Jiangmin Trojan.Generic.kkjm
Webroot Clean
Varist W32/A-9d091a78!Eldorado
Avira Clean
Fortinet W32/Generic.WBNA!tr
Antiy-AVL Trojan/Win32.VB
Kingsoft Win32.Troj.Agent.cks
Gridinsoft Trojan.Win32.Wacatac.dd!n
Xcitium TrojWare.Win32.VB.IOK@54rlsj
Arcabit Trojan.Graftor.D6B60
SUPERAntiSpyware Clean
Microsoft Trojan:Win32/Vindor!pz
Google Detected
AhnLab-V3 Clean
Acronis Clean
McAfee W32/YahLover.worm.aa
TACHYON Clean
VBA32 Clean
Malwarebytes Generic.Malware.AI.DDS
Panda Generic Malware
Zoner Probably Heur.ExeHeaderL
TrendMicro-HouseCall WORM_IMAUT.SME
Rising Worm.VB!1.B58C (CLASSIC)
Yandex Trojan.GenAsa!ZvQRCbQAx6I
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.7164915.susgen
GData Gen:Variant.Graftor.27488
AVG Win32:VB-GNM [Wrm]
DeepInstinct MALICIOUS
alibabacloud Trojan[dropper]:Win/VB.OCU
IRMA Signature
ESET Security (Windows) a variant of Win32/VB.OPS worm
Avast Core Security (Linux) Win32:VB-GNM [Wrm]
C4S ClamAV (Linux) Win.Worm.Sality-6823315-0
F-Secure Antivirus (Linux) Clean
McAfee CLI scanner (Linux) W32/YahLover.worm.aa virus
Bitdefender Antivirus (Linux) Gen:Variant.Graftor.27488
G Data Antivirus (Windows) Virus: Gen:Variant.Graftor.27488 (Engine A)
Sophos Anti-Virus (Linux) Mal/Generic-S
DrWeb Antivirus (Linux) Worm.Siggen.6336
Trend Micro SProtect (Linux) WORM_IMAUT.SME
ClamAV (Linux) Win.Worm.Sality-6823315-0
eScan Antivirus (Linux) Gen:Variant.Graftor.27488(DB)
Kaspersky Standard (Windows) HEUR:Trojan.Win32.Generic
Emsisoft Commandline Scanner (Windows) Gen:Variant.Graftor.27488 (B)
Cuckoo

We're processing your submission... This could take a few seconds.