Static | ZeroBOX

PE Compile Time

2021-08-09 15:37:30

PDB Path

C:\xampp\htdocs\Loct\49f50c0a0e554810b7bfafd1f4957376\Loader\Project1\Release\Project1.pdb

PE Imphash

8c9e2729b91e6cd98523a27cc78ab06c

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000db64 0x0000dc00 6.56984149168
.rdata 0x0000f000 0x00005ab2 0x00005c00 4.87026772778
.data 0x00015000 0x00001664 0x00000a00 2.07405555382
.gfids 0x00017000 0x000000b4 0x00000200 0.920266383871
.rsrc 0x00018000 0x000001e0 0x00000200 4.70468074304

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x00018060 0x0000017d LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library KERNEL32.dll:
0x40f010 CloseHandle
0x40f014 VirtualProtect
0x40f018 CreateFileMappingW
0x40f01c MapViewOfFile
0x40f020 UnmapViewOfFile
0x40f024 lstrcmpW
0x40f028 GetFullPathNameW
0x40f02c MultiByteToWideChar
0x40f030 GetUserDefaultLCID
0x40f034 DecodePointer
0x40f038 WriteConsoleW
0x40f03c GetFileSize
0x40f040 CreateFileW
0x40f044 lstrcatW
0x40f048 GetCommandLineW
0x40f04c SetFilePointerEx
0x40f050 GetConsoleMode
0x40f054 GetConsoleOutputCP
0x40f058 FlushFileBuffers
0x40f05c HeapReAlloc
0x40f060 HeapSize
0x40f064 GetProcessHeap
0x40f06c GetCurrentProcessId
0x40f070 GetCurrentThreadId
0x40f078 InitializeSListHead
0x40f07c IsDebuggerPresent
0x40f088 GetStartupInfoW
0x40f090 GetModuleHandleW
0x40f094 GetCurrentProcess
0x40f098 TerminateProcess
0x40f09c RtlUnwind
0x40f0a0 GetLastError
0x40f0a4 SetLastError
0x40f0b8 TlsAlloc
0x40f0bc TlsGetValue
0x40f0c0 TlsSetValue
0x40f0c4 TlsFree
0x40f0c8 FreeLibrary
0x40f0cc GetProcAddress
0x40f0d0 LoadLibraryExW
0x40f0d4 GetStdHandle
0x40f0d8 WriteFile
0x40f0dc GetModuleFileNameW
0x40f0e0 ExitProcess
0x40f0e4 GetModuleHandleExW
0x40f0e8 HeapFree
0x40f0ec HeapAlloc
0x40f0f0 FindClose
0x40f0f4 FindFirstFileExW
0x40f0f8 FindNextFileW
0x40f0fc IsValidCodePage
0x40f100 GetACP
0x40f104 GetOEMCP
0x40f108 GetCPInfo
0x40f10c GetCommandLineA
0x40f110 WideCharToMultiByte
0x40f11c SetStdHandle
0x40f120 GetFileType
0x40f124 GetStringTypeW
0x40f128 LCMapStringW
0x40f12c RaiseException
Library USER32.dll:
0x40f14c GetDC
0x40f150 GrayStringW
Library ADVAPI32.dll:
0x40f000 RegOpenKeyW
0x40f004 RegCloseKey
0x40f008 RegQueryValueW
Library SHELL32.dll:
0x40f144 CommandLineToArgvW
Library ole32.dll:
0x40f158 CoInitialize
0x40f15c CLSIDFromProgID
0x40f160 CoUninitialize
0x40f164 CoCreateInstance
Library OLEAUT32.dll:
0x40f134 LoadTypeLib
0x40f138 SysFreeString
0x40f13c SysAllocStringLen

!This program cannot be run in DOS mode.
`.rdata
@.data
.gfids
@.rsrc
t.hXfA
URPQQh
;t$,v-
UQPXY]Y[
j"_f9y
tlj*Yf
f9:t!V
QQSVj8j@
j$hHAA
PPPPPPPP
PPPPPWS
PP9E u:PPVWP
FlsAlloc
FlsFree
FlsSetValue
InitializeCriticalSectionEx
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
CorExitProcess
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
LCMapStringEx
LocaleNameToLCID
AppPolicyGetProcessTerminationMethod
?5Wg4p
%S#[k=
"B <1=
_hypot
_nextafter
RSDS?x
C:\xampp\htdocs\Loct\49f50c0a0e554810b7bfafd1f4957376\Loader\Project1\Release\Project1.pdb
.text$mn
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.gfids$y
.rsrc$01
.rsrc$02
GetCommandLineW
CreateFileW
GetFileSize
GetFullPathNameW
CloseHandle
VirtualProtect
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
lstrcmpW
lstrcatW
MultiByteToWideChar
GetUserDefaultLCID
KERNEL32.dll
GrayStringW
USER32.dll
RegCloseKey
RegOpenKeyW
RegQueryValueW
ADVAPI32.dll
CommandLineToArgvW
SHELL32.dll
CoUninitialize
CoCreateInstance
CLSIDFromProgID
CoInitialize
ole32.dll
OLEAUT32.dll
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapFree
HeapAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetStringTypeW
LCMapStringW
GetProcessHeap
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
DecodePointer
RaiseException
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
JAWW*]
2VvpBOr
txzhs
Rftx"B
Z0#%h[]
`yK:!=$C
Z0#%h[p>
6&f~0TU
9 .G$_
woW51-
>E8thj
Ds@dCG4
q1Qv{O8~
n``$EYA
QI3^3c
k>+/$B0
#|=y|c
)vrf)v
qs7Q-n
^@{2vKF
rLz>1Q
k>+/$B0
K$9Gac
z(|@vy
TAb36q
Q7+\Up
O)-c]L
[J3}TO
oa0kqK~A
q"QG|a
72_$wK
Y@0E\oO
K$uXe%U
5p&!*&|
=qs<5L
o{<:)[d:
"R#:^;~P
gm\Jwt
zAUpA8
cwUpwV!
G|aD(7p
FiPR9e
btz(|QO
Of[%Gu
`R#+2k
Ml$PsB
^^/-9?k
|R^$vFj
z(qF&TH
az#Oz(
AxkbK~Af
az#Oz(
^3~P:V!
% ;gJ-
^<Z_j=
Qn+!Up
$3}r:2
qzvrGQ
'0r6]x
<bEI~I
Fz>n{:
6e/-dW
@Ij)5r
.28e
EZW[J:
KbT(uj
rFj}&M
B~]->[
^3Qvggk.
mv^pD)
F#I}.B-
WZJxkn;&A7u<2
6&p'7raz
xY(T9%.
kh32gy
R^<*Fj
% \gJ-i
YPT9%p
f<:)4b<
v3#LE!
s#Ulxj
+[xXW ~A
xk,v~AS
R#DxkG
a_y4oa
.n =pp
azMOzF>
<0I)|=
Bfc}?uD
Az{'zj
kGSC(/
ToJCTUK~
[gooY
(ppMsv
UbEI~I
4unU=pp$
c^az>|wFDR
^az.OzF
FiPeMv
~!/-o/
Mj:>MdoJ
Qns?Up
icuTWW~7]
833|~P
vr1vVa
Oog(pM
azPOzF
2$}'g%
Nrq"7G|
5c&]y[
YxT9%|
~JxkVK~
ulo@Ik
azKl\
K~(+Xj
ees#U1
_#4oa0
sn54vR
2>_(rHI1
07q836
&kE(kZ
Y{nU2p~
crUpwV
*:C](oJ
Nq_(pN
rq"7G|
=K$}Yj
zyg<1B0YQ
).D"s?DW
Z85^ILP
.hjsnx=p~$
~5~%}
~)sp5ovR
WcpAxi
3U8Yq
0Ea/S3
<.n =pp
:Y4Jyc
xXW\pAx
*j^az>
C~:(Mp
1VW.mp
DvmXG[
K[<3A8?
D0r6'D
0S\M8?(u
$PvCF<j
FGPe94
Ef+2nH
z2]yC+)
i~8~pw
xkhK~(
azK0`(
ODE9Z73}
#JxkKK~(
5XW'mR
BCOp7>
BCOp7>
12G0Ea
BCOp7>
"WQ)Up
=lR!a0
}r^-)Z
-uL<>1T
po-fk`
BCOp7>
u=x4{5
,(+R>1T
XA{7:/
>KLqf~
Ih$jZJ
mVJ$J/
gb~ASj
+9-w{@{2
rJxkVK~
K~A7^xJ
-=kuPN|a
."#}T9(|
?{72|^
lA@4+9
j<?7bh$
\VSA-Tz
:#E=0*6
IFjFqCQk
BCp^>
#|=y|c
Y1<(b"
3~/SO^
:I3~R9
~s{Q-A
%e<AD\
>["rG|
lj}q~bj
I.28We
nu;}$V
E_,4o-fk<
GeeJ#U
%U/z?_wF!({
(uj+LSW
7Qn`U"^
nG5Q#U
GEW|=y
$h6p5v
yIKr6V
K ]3A4
}}L+Hc],
g]uSxk
s.)I>1T
azOzF
q,vrG/V
~RY^l<?
R^$2_j
2kWK~A
k>+/$B
6-a<Q."
=$C><{
qsR65
lkvP-:
#M@>^)y9Q5
MXMPsB
u*~Qa2J
[l"&|o
IA<sa4
w.,KpT
az]OzF
^4z#~C
Bg2<$~
xYwT9%
B]JSM;
<EPn1$
j.n =pp
+KN72Y
p\!TuY
lk{Sv4
[^},Kp
az`OzF
iXrDvmXG
o0Pljw
r|R^1W
0qPU1{
qq~^]f
8HLc>1Q
og/z?k
E~O7pm
oJ`xDK~9
- gt."
a_3~"V
L-4:Nb"
k:r`f,K~
,N'sNNM
[==&m,N
q"@b7?
4!$P#/-M
ML[m~P
xkSR%A7
!$P#COM
MLMd~P
SeiJ#U
[==&m,N
[==&m,N
rq"Xa_a
iwS3}g
og/z?kdW
*&|\8(
qLc>1Q
R(N's0
a_3~"V
>hI{>_
q"Xa_a
L\|R@
Iq"@D7?
#Jx6WE
-/gt."
>hII>_
0FTaz4l
L<1/<
QIwI3c
6 z#B]r
[c*~*"P
h&Ksu]=
JU8rIf
tpoT)~
0.U9H.
s[v5[;
(fJvRh
KLV9CyP
oIy,GA
*6U[t;
FyaSt$
dle@Y3
{I6GU)<
o/jC:
$#@B[Ty
bw lK%
~IXe_*
Rk4PsG
JL}D_R+
E-;d:DS0
pB>9$*B
#5@Z~0
\kP@-h
_C1;+L
svV:Y&(
Wx4N%2
_@t5uGf
[rW9_9
%ihM)De
4$,oX;
sYE1Ym
k6A~A7
e3)>N
iwoJxk<Kd>
_x&N'
I30r%T
[]yvlz8
krvL?G
\,K~Ax
}d9_]R
TW?xNo
K$A0c|
oJzgt$
^O&n>_
2n2E]N
U$_YE%
Me{|R@
Up+>-]
o2E]NNy
vrf:vn
Up+>r"
n2E]N?
@{$58Z
vrf:v_y4
Up+>T]
^3Vr9RK
azsO3,R(R
Up+>k"
0hKOhq
*||TK8
GMqW_~P
@{$5xZ
Up+>2;
Oz(>_
DRm(!K
D~\_'`u<
*G<y 2y
rdQ|N'N
qN~x_PX
5uy(K+D
zp@%6O
((u4?:
RhBqJwc6
|>r$S*
agBR<u
qXrZu'
#",G\I
DMXIq~
$9e8%=
>wRaAyg
=iLG.HE
C;tWST
-:8tu,
!^az,3j
Wl|*0rA'
o7jUpQ)
vKf&AN
W'&"GM
OOQ%P9%
3!v9soR*
YQDExS
k#CJs|
vL>q($
Aej^+T
r{{p~]
`pt,},
B@(m6-
|gXmD
}p_l?Ql
,}q0t=E
*[]|^9p
1NkUyO
q#L?)4
|6i"[a
mY'Q>vYwh[k8
S+,Jy+
?Ksa j
{#}[@
Js]U3v
4qja4m
Y6h*E50
l`]Gp
Js]UC$
=(>ezFG0
}^~VN$
Q0PI5`I9
':n5JM
UND3m@
H3k=AO
np+\wk
P|U,WU?
nYg?q=
_k#o$x7
(R:uAO
>GV+q&
=wDiKP\
i05~dV
Gvpz1sN
'*w8P!3
i=j$Di
Av'0jL
b}yi05~d
|!ej)\+`
3ql1P_X
8o-E>@
az?Oz(
%kMMD#R
oJxk'K
9pk)mN
G!pB-P
+c]v"H6
@jjjjj
@advapi32
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
mscoree.dll
@ja-JP
A A(A0A8A@AHAPA`ApA
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
((((( H
Aapi-ms-win-core-datetime-l1-1-1
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-file-l1-2-2
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-synch-l1-2-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
advapi32
kernel32
api-ms-win-appmodel-runtime-l1-1-2
user32
api-ms-
ext-ms-
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
CONOUT$
WScript
@wscript.exe
\ScriptEngine
WScript
Antivirus Signature
Bkav W32.AIDetect.malware2
Lionic Clean
Elastic malicious (high confidence)
MicroWorld-eScan Clean
CMC Clean
CAT-QuickHeal Clean
ALYac Clean
Cylance Unsafe
VIPRE LooksLike.Win32.Crowti.b (v)
Sangfor Trojan.Win32.Save.a
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
Cybereason malicious.79071a
Baidu Clean
Cyren W32/Injector.AKK.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.HMAB
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky HEUR:Trojan-Spy.Win32.Noon.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Tencent Clean
Ad-Aware Clean
TACHYON Clean
Emsisoft Trojan.Crypt (A)
Comodo Clean
F-Secure Clean
DrWeb Trojan.PWS.Siggen3.1955
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Generic.fc
MaxSecure Clean
FireEye Generic.mg.de74d8f4a95d6fe1
Sophos Clean
Ikarus Trojan.Crypter
GData Clean
Jiangmin Clean
Webroot Clean
Avira Clean
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Clean
Cynet Malicious (score: 100)
AhnLab-V3 Clean
Acronis Clean
McAfee Clean
MAX Clean
VBA32 BScope.Trojan-Dropper.Injector
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Clean
Yandex Clean
SentinelOne Static AI - Suspicious PE
eGambit Unsafe.AI_Score_99%
Fortinet W32/GenKryptik.FIBB!tr
BitDefenderTheta Gen:NN.ZexaF.34058.tuZ@aW07qsii
Avast Clean
CrowdStrike Clean
Qihoo-360 HEUR/QVM10.1.26FB.Malware.Gen
No IRMA results available.