Static | ZeroBOX

PE Compile Time

2020-05-31 15:31:08

PDB Path

C:\nolacibiniw josalila\16 yaxu65_vevetipoco.pdb

PE Imphash

02fed18d5788c3d9bcc1897631bb2a01

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000100a1 0x00010200 7.52931581244
.rdata 0x00012000 0x0000407f 0x00004200 4.39246490531
.data 0x00017000 0x0288f238 0x00003a00 0.861857490844
.rsrc 0x028a7000 0x0000c598 0x0000c600 6.69449653539

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x028b2920 0x00000468 None SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x028b2920 0x00000468 None SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x028b2920 0x00000468 None SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x028b2920 0x00000468 None SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x028b2920 0x00000468 None SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x028b2920 0x00000468 None SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x028b2920 0x00000468 None SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x028b2920 0x00000468 None SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x028b2920 0x00000468 None SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x028b2920 0x00000468 None SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x028b2920 0x00000468 None SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x028b2920 0x00000468 None SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x028b2920 0x00000468 None SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_STRING 0x028b3250 0x00000342 None SUBLANG_SYS_DEFAULT data
RT_STRING 0x028b3250 0x00000342 None SUBLANG_SYS_DEFAULT data
RT_ACCELERATOR 0x028b2df0 0x00000030 None SUBLANG_SYS_DEFAULT data
RT_GROUP_ICON 0x028b2d88 0x00000068 None SUBLANG_SYS_DEFAULT data
RT_GROUP_ICON 0x028b2d88 0x00000068 None SUBLANG_SYS_DEFAULT data
RT_VERSION 0x028b2e50 0x000001b4 LANG_NEUTRAL SUBLANG_NEUTRAL data
None 0x028b2e40 0x0000000a LANG_NEUTRAL SUBLANG_NEUTRAL data
None 0x028b2e40 0x0000000a LANG_NEUTRAL SUBLANG_NEUTRAL data
None 0x028b2e40 0x0000000a LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library KERNEL32.dll:
0x41200c WriteConsoleOutputW
0x412010 EndUpdateResourceW
0x41201c GetCurrentProcess
0x412028 WaitForSingleObject
0x412030 GetModuleHandleW
0x412034 EnumCalendarInfoExW
0x412038 SetThreadUILanguage
0x412040 GetConsoleTitleA
0x412048 GetConsoleCP
0x41204c ReadConsoleInputA
0x412054 lstrcpynW
0x41205c GetFileAttributesW
0x412064 WriteConsoleW
0x412068 IsBadWritePtr
0x41206c GetMailslotInfo
0x412070 lstrcatA
0x412074 lstrlenW
0x412078 FlushFileBuffers
0x41207c InterlockedExchange
0x412088 SetLastError
0x41208c GetProcAddress
0x412090 PeekConsoleInputW
0x412094 EnumDateFormatsExA
0x41209c LocalLock
0x4120a4 GlobalGetAtomNameA
0x4120a8 ResetEvent
0x4120ac GetLocalTime
0x4120b0 LoadLibraryA
0x4120b4 LocalAlloc
0x4120b8 SetConsoleOutputCP
0x4120bc SetFileApisToANSI
0x4120c0 GetOEMCP
0x4120c4 GetModuleHandleA
0x4120c8 HeapSetInformation
0x4120cc GetCPInfoExA
0x4120d0 FindFirstVolumeA
0x4120d8 GetCurrentProcessId
0x4120e0 GetModuleFileNameW
0x4120f0 HeapAlloc
0x4120f4 GetCommandLineA
0x4120f8 GetStartupInfoA
0x4120fc RaiseException
0x412100 RtlUnwind
0x412104 Sleep
0x412108 ExitProcess
0x41210c GetLastError
0x412110 WriteFile
0x412114 GetStdHandle
0x412118 GetModuleFileNameA
0x41211c TerminateProcess
0x412120 IsDebuggerPresent
0x412124 HeapFree
0x412130 VirtualFree
0x412134 VirtualAlloc
0x412138 HeapReAlloc
0x41213c HeapCreate
0x412148 WideCharToMultiByte
0x412150 SetHandleCount
0x412154 GetFileType
0x412158 TlsGetValue
0x41215c TlsAlloc
0x412160 TlsSetValue
0x412164 TlsFree
0x412168 GetCurrentThreadId
0x412170 GetTickCount
0x41217c HeapSize
0x412180 GetCPInfo
0x412184 GetACP
0x412188 IsValidCodePage
0x41218c GetLocaleInfoA
0x412190 LCMapStringA
0x412194 MultiByteToWideChar
0x412198 LCMapStringW
0x41219c GetStringTypeA
0x4121a0 GetStringTypeW
Library USER32.dll:
0x4121a8 GetAltTabInfoW

Exports

Ordinal Address Name
1 0x401065 @SetFirstEverVice@8
!This program cannot be run in DOS mode.
`.rdata
@.data
VVVVVV
0WWWWW
0WWWWW
QQSVWd
j h8QA
u&hp(A
0SSSSS
>=Yt1j
j@j ^V
t$h$)A
HtHu4j
s[S;7|G;w
tR99u2
0SSSSS
0SSSSS
URPQQh s@
0A@@Ju
;t$,v-
UQPXY]Y[
t"SS9]
PPPPPPPP
PPPPPPPP
t+WWVPV
UBqM(L
8D&B'
NXe!!%L
w3AUKE]
3WL@W[
%d#|SN
.z${_F
Z)&ZYy
M;58E8
6hQtAY
vexC4{B
r30jSO
*C_HEU
LF7cyu
mmL=9W
v$ILf{
z"?,i~NKe
B[v~),
9R&</q
MQ&}Pwk
,-,e5N
9s!|o[
#B}[)%D
:h X73
\rDwMMg
YDDP|w
p[bN-c
4P::CaG
o(L*c
7]Er'n
"g|'5
No).eO<
w8$CT@
7u<'Xp
lov><>
~`ho%uVd
KM u8
0]WqT%
SXkan*
RVi%H&
$>N%DtJE_
$QT91shI
w>ufzU
0SSa};`
7ItwJi
5Y*;+5QO
T7"jR
p0<6=ac
WUO$y0Tc
_8F6\|
;hE)w.
W)x26<
bad allocation
string too long
invalid string position
Unknown exception
CorExitProcess
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
bad exception
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
bad allocation
hizejikekacuwawidobikopaganinetayizufuluyijoyegixoyobohamepoxedujohuyokuyusu
dapibakazubanukufileture hoyulasato bivefuvoduyuzabotojupakiwoho
fuvawivuyijulona
kernel32.dll
LocalAlloc
VirtualProtect
vofovocadicupupelirujifayas bitenipuselucimixofeyolujuc gukagigu
lohukiwazitasixubalicacefome fodaxe hifisudefiziyigalejajarinekaham gokatunimefop liwiwirarup
C:\nolacibiniw josalila\16 yaxu65_vevetipoco.pdb
GetSystemDefaultLangID
GetConsoleAliasesLengthW
WriteConsoleOutputCharacterA
BuildCommDCBAndTimeoutsA
WriteConsoleOutputW
EndUpdateResourceW
InterlockedIncrement
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
WaitForSingleObject
GetSystemDefaultLCID
GetModuleHandleW
EnumCalendarInfoExW
SetThreadUILanguage
GetConsoleAliasesLengthA
GetConsoleTitleA
GetEnvironmentStrings
GetConsoleCP
ReadConsoleInputA
SetVolumeMountPointA
lstrcpynW
SetConsoleCursorPosition
GetFileAttributesW
SetTimeZoneInformation
WriteConsoleW
IsBadWritePtr
GetMailslotInfo
GetModuleFileNameW
lstrcatA
lstrlenW
FlushFileBuffers
InterlockedExchange
FillConsoleOutputCharacterW
ChangeTimerQueueTimer
SetLastError
GetProcAddress
PeekConsoleInputW
EnumDateFormatsExA
CreateTimerQueueTimer
LocalLock
EnterCriticalSection
GlobalGetAtomNameA
ResetEvent
GetLocalTime
LoadLibraryA
LocalAlloc
SetConsoleOutputCP
SetFileApisToANSI
GetOEMCP
GetModuleHandleA
HeapSetInformation
GetCPInfoExA
FindFirstVolumeA
DeleteTimerQueueTimer
GetCurrentProcessId
GetConsoleProcessList
KERNEL32.dll
GetAltTabInfoW
USER32.dll
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
ExitProcess
GetLastError
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
HeapSize
GetCPInfo
GetACP
IsValidCodePage
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
nayi.exe
@SetFirstEverVice@8
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVout_of_range@std@@
.?AVtype_info@@
.?AVbad_exception@std@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVexception@std@@
.?AVbad_alloc@std@@
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
L%LHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHh
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHP
HHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHZ
HHHHHHHHHHHHHHHHHHHHHHHHHHHHH%^
Vsn&n<nnwI
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHA
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHP.
HHHHHHHHHHHHHHHHHHHHHHHHHHHHP.
HHHHHHHHHHHHHHHHHHHHHHHHHHHHU
LHHHHHHHHHHHHHHHHHHHHHHHHHHHHP~
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHP~r
hHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
YHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
]HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
?<~42.
+9G{y06}
)@Wzm8J|
A[fwQ43|
"NXqA.J}\
![c~F23~
Hn^}qE<
LkT}~^m
7qu|}V`z
#|?-.)_9eh
hR0Rhx
qC:"lN
tssQz`
.Ss>"m
lHLn3:T
Pz~>*u
8YlE*v
W}})9NyS
_2g~~,c
2Md=$z
mscoree.dll
KERNEL32.DLL
((((( H
h(((( H
H
VS_VERSION_INFO
StringFileInform
020564c6
InternalName
sagzmioloke.awi
Copyright
Copyrighz (C) 2021, fudkageta
ProductVersion
7.59.22.123
VarFileInfo
Translation
Higovihupib vomapopacuyote>Dociconifir loze kojotipu hixuginujegisom gahukejicatibe siseg
Heziromexo wideviloz
Gec yeraxewesexe xulafimo
Ligez xasizatofuhifiw munigABunamew xasadezed zoledilupihol kawahuwohil tijukadoyihu funejipi2Wutuca per nivekafidi xopiyepuhocobew kiwesopujaja
bDoxoyani nediwayuza zopukisa gugivabikokono raxicirenelun kusufedo nivameyorowu siboxijefaz bimuxu.Baga lagabuvi gedoluhumasaluc zozahofosut wabaAXowerahero zahogu zaboluza fuhiwohajoyabuv pip nub fudezukeyesigu<Xemalufutidah nowegowasayugu begozod jino jofakut pigaxocanu2Dibifatov gapel fubitatit gigixiyicobo kohefatuzis4Zinuzusekawaw mixegamabujek murehivev nawa yar nipih
Zuzawu nesukorezep jixerifuluh
Antivirus Signature
Bkav W32.AIDetect.malware1
Lionic Clean
Elastic malicious (high confidence)
MicroWorld-eScan Clean
FireEye Generic.mg.8adf73ac6b7cab5e
CAT-QuickHeal Clean
ALYac Clean
Cylance Unsafe
VIPRE Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 0058135a1 )
BitDefender Clean
K7GW Trojan ( 0058135a1 )
CrowdStrike win/malicious_confidence_100% (W)
Baidu Clean
Cyren W32/Kryptik.EWJ.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 Clean
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky VHO:Backdoor.Win32.Convagent.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Trojan.Kryptik!1.D8AC (CLASSIC)
Ad-Aware Clean
Sophos ML/PE-A + Troj/Krypt-W
Comodo Clean
F-Secure Clean
DrWeb Clean
Zillya Clean
TrendMicro Mal_HPGen-50
McAfee-GW-Edition BehavesLike.Win32.Emotet.ch
CMC Clean
Emsisoft Trojan.Crypt (A)
SentinelOne Static AI - Malicious PE
GData Clean
Jiangmin Clean
Webroot Clean
Avira Clean
MAX Clean
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Sabsik.TE.B!ml
Cynet Malicious (score: 100)
AhnLab-V3 Clean
Acronis suspicious
McAfee Clean
TACHYON Clean
VBA32 Clean
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Mal_HPGen-50
Tencent Clean
Yandex Clean
Ikarus Clean
MaxSecure Trojan.Malware.300983.susgen
Fortinet Clean
BitDefenderTheta Gen:NN.ZexaF.34088.jq0@ayi3awmG
Avast Clean
No IRMA results available.