Static | ZeroBOX

PE Compile Time

2022-09-12 09:45:32

PDB Path

C:\xogulawime\vojovizasajazu\zek21\zok.pdb

PE Imphash

2de346935dc4b8f552af9d851541677a

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000241ca 0x00024200 7.62011400266
.data 0x00026000 0x0147c540 0x00001a00 1.85490687198
.rsrc 0x014a3000 0x00004150 0x00004200 4.07335965603
.reloc 0x014a8000 0x0000a2fc 0x0000a400 0.804899710032

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x014a5e60 0x00000468 LANG_PORTUGUESE SUBLANG_PORTUGUESE_BRAZILIAN GLS_BINARY_LSB_FIRST
RT_ICON 0x014a5e60 0x00000468 LANG_PORTUGUESE SUBLANG_PORTUGUESE_BRAZILIAN GLS_BINARY_LSB_FIRST
RT_ICON 0x014a5e60 0x00000468 LANG_PORTUGUESE SUBLANG_PORTUGUESE_BRAZILIAN GLS_BINARY_LSB_FIRST
RT_STRING 0x014a6c60 0x000004ee LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_STRING 0x014a6c60 0x000004ee LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_STRING 0x014a6c60 0x000004ee LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x014a62c8 0x00000030 LANG_PORTUGUESE SUBLANG_PORTUGUESE_BRAZILIAN data
RT_VERSION 0x014a62f8 0x0000023c LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library KERNEL32.dll:
0x401008 SearchPathW
0x40100c HeapFree
0x401014 ConnectNamedPipe
0x401018 GetTickCount
0x401020 ReadConsoleOutputA
0x401024 LoadLibraryW
0x401028 GetLocaleInfoW
0x40102c ReadConsoleInputA
0x401030 TransactNamedPipe
0x401034 GetNamedPipeInfo
0x401038 CreateActCtxA
0x40103c DisconnectNamedPipe
0x401040 GetConsoleAliasesW
0x401044 InterlockedExchange
0x401048 GetProfileIntA
0x40104c Module32First
0x401054 GetLastError
0x401058 GetProcAddress
0x40105c VirtualAlloc
0x401060 GetDateFormatW
0x401064 DeleteTimerQueue
0x40106c FoldStringA
0x401070 EnumResourceTypesW
0x401074 GetOEMCP
0x401078 GetModuleHandleA
0x40107c HeapSetInformation
0x401080 UpdateResourceW
0x401084 CreateMutexA
0x401088 PurgeComm
0x40108c GetCurrentThreadId
0x401090 TlsAlloc
0x401094 LocalFree
0x401098 AreFileApisANSI
0x40109c WriteConsoleW
0x4010a0 GetConsoleOutputCP
0x4010a4 WriteConsoleA
0x4010a8 ReadFile
0x4010ac LoadLibraryA
0x4010b0 GetComputerNameA
0x4010bc Sleep
0x4010d0 TerminateProcess
0x4010d4 GetCurrentProcess
0x4010e0 IsDebuggerPresent
0x4010e4 MultiByteToWideChar
0x4010e8 GetModuleHandleW
0x4010ec ExitProcess
0x4010f0 GetStartupInfoW
0x4010f4 RtlUnwind
0x4010f8 RaiseException
0x4010fc LCMapStringA
0x401100 WideCharToMultiByte
0x401104 LCMapStringW
0x401108 GetCPInfo
0x40110c HeapAlloc
0x401110 HeapCreate
0x401114 VirtualFree
0x401118 HeapReAlloc
0x40111c TlsGetValue
0x401120 TlsSetValue
0x401124 TlsFree
0x401128 SetLastError
0x40112c GetACP
0x401130 IsValidCodePage
0x401134 WriteFile
0x401138 GetStdHandle
0x40113c GetModuleFileNameA
0x401144 GetModuleFileNameW
0x401150 GetCommandLineW
0x401154 SetHandleCount
0x401158 GetFileType
0x40115c GetStartupInfoA
0x401164 GetCurrentProcessId
0x40116c HeapSize
0x401170 GetLocaleInfoA
0x401174 GetStringTypeA
0x401178 GetStringTypeW
0x40117c CloseHandle
0x401180 CreateFileA
0x401184 GetConsoleCP
0x401188 GetConsoleMode
0x40118c FlushFileBuffers
0x401190 SetFilePointer
0x401194 SetStdHandle
0x401198 SetEndOfFile
0x40119c GetProcessHeap
Library USER32.dll:
0x4011a4 CharUpperBuffA
0x4011ac CharLowerBuffA
0x4011b0 CharToOemBuffW
0x4011b4 LoadMenuA
Library ADVAPI32.dll:
0x401000 LogonUserA

!This program cannot be run in DOS mode.
`.data
@.reloc
bad allocation
Unknown exception
CorExitProcess
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
(null)
`h````
xpxxxx
UTF-16LE
UNICODE
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
bad exception
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
`h`hhh
xppwpp
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
CONOUT$
bad allocation
kernel32.dll
msimg32.dll
C:\xogulawime\vojovizasajazu\zek21\zok.pdb
VVVVVV
/SVWuF3
PVVVVV
VVVVVVV
u'VVVVVV
0WWWWW
jXhxAB
QQSVWd
to=0nB
t"SS9]
0SSSSS
tehkr@
HHtXHHt
>If90t
<at9<rt,<wt
URPQQh|
0A@@Ju
j hpCB
>=Yt1j
QQSVWh
j@j ^V
HtHu4j
s[S;7|G;w
tR99u2
v$;5TnB
0SSSSS
PPPPPPPP
0SSSSS
PPPPPPPP
t+WWVPV
^SSSSS
j"^SSSSS
tGHt.Ht&
^SSSSS
8VVVVV
;t$,v-
UQPXY]Y[
0WWWWW
AAFFf;
]K4=@FM
M70EM9G=OR
e)1hl*t'
X}f&9b
nZ}.3:
W~$}4
(McA(1\ER
YneDN;
6F<KF,5
}=>;|;L
u@Yd+IQ
'?DMy2
A}G@c$0
%^R!o{
]hzPcq
b+C!U(PU
Ml)"82
fB l(ls
 #;qJ
r"d<AU
#?-TMu
tuLqO#0q1
Oa_=A@Rp
FJgBaYy;/,w
AILnj)
2^StB`-
?SA1[AL
Ot[qV`
<28rtO
)t1 ] 4
Y ;[tEY
S].A[A)
7wEeSX
KxwFPY
_^y;r"e
Re0aC<
XAS|qs
``baj6
"`@hA[p
CS[b>:
[ez-3_XE&
ZT- 'T"
ArGVf@
1H~zb8
``Gt@d
y[ [Rl
h&zW?I>I
tE<`~8;
cj,sZC}
(JTuR{^
?-Rc=G
jdPF0M
)awO4%
0DJ+W0
9/as6T
J^)iZ2
`AZ|']
$_+v&~*
$ ~wr5
'5<7[
N(1NF`y
%Jzd+$
es7@}N
:4UQ>rJ
XT:]F1
l;-Ri=
XOTI.u
"NC3oA
R_,Cp?
[ S`:V
ESmGn
d[vPO/
KQOnVge
]1gy1p
|#4'{s=
k"Djm[
Mjm,:z
JK`Ga9bL
#IAb!$
knV2\zi;Ob
yjc)Rti
26)MCc
BT{wR
!v]lG+
67v*;u"+
5GB-VY
Z6{86;
=cM*-I
p7Jtm]p
~8kZYF
$t o#h
+|\qnK
r?X<Gl
Q<*8-K
oJE2]1
?1B$TB
3sm]6
yD'=c)KS
8r(1#pWQ5
9/_Hm2
KzQto{W
%I]2Tl[lj
vRd`4z
2T("Nm
$hlK`Gki
uEg`TQ
,.1c a
NpXqWN_
1`4HsD*RS
"-[}0e
BLPNw.r
UHc 7x
r{PFXl(c
B5bQsG
Y*&/F)
{(4p^C
9tHP9:
_|@[F\
It8)A-
de4]<e
hx/V?R"
pD@tQm
m"[S<,x
.+'>mn
!3pDPWf
<_Iym0
n^## %.
F9I\V(
nC2JjQ$
*5kIaikX/
UcML5]
.C#kEh
&!xM r/
?>~o}m
fs^GUsc
GetComputerNameA
GetDateFormatW
SearchPathW
HeapFree
InterlockedCompareExchange
ConnectNamedPipe
GetTickCount
GetWindowsDirectoryA
ReadConsoleOutputA
LoadLibraryW
GetLocaleInfoW
ReadConsoleInputA
TransactNamedPipe
GetNamedPipeInfo
CreateActCtxA
DisconnectNamedPipe
GetConsoleAliasesW
InterlockedExchange
GetProfileIntA
Module32First
FillConsoleOutputCharacterW
GetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
DeleteTimerQueue
FindNextChangeNotification
FoldStringA
EnumResourceTypesW
GetOEMCP
GetModuleHandleA
HeapSetInformation
UpdateResourceW
CreateMutexA
PurgeComm
GetCurrentThreadId
TlsAlloc
LocalFree
AreFileApisANSI
KERNEL32.dll
CharToOemBuffW
CharLowerBuffA
CreateAcceleratorTableA
CharUpperBuffA
LoadMenuA
USER32.dll
LogonUserA
ADVAPI32.dll
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
MultiByteToWideChar
GetModuleHandleW
ExitProcess
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetACP
IsValidCodePage
WriteFile
GetStdHandle
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
CloseHandle
CreateFileA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
SetStdHandle
SetEndOfFile
GetProcessHeap
ReadFile
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
Copyright (c) 1992-2004 by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
.?AVtype_info@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVbad_exception@std@@
.?AVexception@std@@
.?AVbad_alloc@std@@
N:iiBxj@
}z}|~~
}|~y}~
z{{~|~
{{z}{y
}{{|~|
{}|}}z
|}z{z{{
}|~~z|{{
2@2D2H2P2T2X2p2t2
: :$:(:,:0:4:8:<:@:D:H:L:P:T:X:\:`:d:h:l:p:t:x:|:
; ;$;(;,;0;4;8;<;@;D;H;L;
<`=d=t=x=
> >$>,>D>T>X>`>x>
0,070D0U0m0
1191F1N1W1y1
222;2A2F2U2a2j2w2
3!3'32393F3g3z3
4!4D4Z4y4~4
9!92989C9H9\9l9|9
;/;!=3=
>7>>>V>x>%?0?=?
J0R0g0r0
1)222_2z2
3,373<3L3V3]3h3q3
3%424\4a4l4q4
4@5M5Y5f5
6%6,626D6L6W6
8*9C9l9q9
=">U>u>:?d?
6 6$6M6s6
7-84888<8@8D8H8L8P8
9$9[9d9p9
:?:X:_:g:l:p:t:
;N;T;X;\;`;
<!<K<}<
?h?m?{?
0.040=0P0t0
1)171<1
4#4,4I4O4Z4_4g4m4w4~4
9$9W9}9
<b<<=D=\=t=
0*0?0F0Z0a0y0
1,131@1c1x1
202H2n2
44$4)4/43494>4D4I4X4n4y4~4
5(5.5H5W5d5p5
686k6z6
7)7V7^7}7
;<*<4<M<W<j<
?.?6?>?U?n?
3.3P3U3v3{3
3X4]4o4
576=6V6\6
7+7Z7h7
9-9<9E9Z9
:":*:5:t:
;';8;C;
<5=<=Q=
0)060B0J0R0^0
1I1V1i112W3P4
<H>N>T>Z>`>f>m>t>{>
??5?<?
1.1@1R1d1v1
1#3-3E3L3V3^3k3r3
4)6F6r6
7q:&;0;c;
<7=1>R>^>
707B7U7g7
;,;I;T;k;
0Q1k1t1
2(212@2E2O2]2
3#3!5%6
4(4c4s4
727:7x7
<_=l=D>N>
4,464?4J4_4f4l4
"040F0X0m0w0
101P1p1
282X2d2
3$3(3D3H3d3h3
4,404@4d4p4x4
5(5D5H5h5
606P6p6
7 7@7L7l7x7
<$<,<4<<<D<L<T<\<d<l<t<|<
<@=D=p=t=x=|=
>(>0>4>8><>@>D>H>L>P>T>`>
mscoree.dll
((((( H
h(((( H
H
KERNEL32.DLL
(null)
kernel32.dll
xokagogepocitewituxewiwicuyim
VS_VERSION_INFO
StringFileInfo
042831F2
FileDescription
ElecticalStone
LegalCopyright
Copyright (C) 2023, histsrical
ProductsVersion
58.18.52.68
ProductName
Jungle
ProductionVersion
4.90.79.94
VarFileInfo
Translation
fJoluhenadumepek vizifet pucehamexawexak jogevosegu tuzeyakitupu vob sivubu vukek gunewakahakajoc xevut
Yexewagopagiwo^Mugahunural luyenohesedagu nucedoyihimo yawikin wofazavilunatu nasinawuziw hedito hibozimezipu
Geruxucuwo.Horifetazur gohoyozafudagi cozax nonamowet loz
Wafofaxegig bicupis sasukoc.Perexumorosim zajuxunipu foxapidoful zup fibil
Goyekojevane kexo!Vezof yujupudebopunah teyimivusag/Jipedaxefot wujobin bavecirohopunin fayoxukejij
Yutadod ruyedalaj gas pisuj
BDumutulurota busojowiruhowu peki wigapepuz bebuyowixewoy vugomapak
Mirimemi homa goridaw
Gisobivaheki vipowayi libimodu
7Hovojovozofube hoxeyinurujibih taxodipub wum moxutozome
IRoj susivufizibaces mezexuk bebuluwexojan johidigazadocu sejazadirulu vid
Towegajawayohun jotahag muyuUTuvutoyeceyono sunepume jocibodewe kajimogojehagu sofuti neduzifakosew ropakoduzoyaju6Kowogenug cereziy vapuriletoxuri fuf socomerekagil dob
Paxugaco
Samugemivaz
Rux vuco yiluhe gefilez
VuluriuYiwotebuli yenecokoji huzixapemerevo teyomohegegela poracevagijux tunoyagif yutiwifutijajuc culadojo pidobiduwuh vabo&Rina vib pukoce vifisedoyulu resuh voyGRetomohatenep mef zopaja yovorirajojulo zafogoce setinucekinibev libulolFizerihehawas sigomuziluvu bebokoduyizo rapiriyacelab taduwegayojirof kunijugumufodi cari nafodinuje pikupod<Sibosiley xijadec hupamupetu kewi jekeyopeno kir ramuhekelix
Gudugajadevi gebe gud!Hebin lavoh zefilexaz dajurakusos
Raco cizenesinowu gicupogif\Yedapetusafow roroxaxah fobesuzitawig wesun xufixopoyevis borebomumulu yafokecara bebenuruge
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Clean
tehtris Generic.Malware
MicroWorld-eScan Clean
FireEye Generic.mg.3cf88d419652e5fc
CAT-QuickHeal Ransom.Stop.P5
ALYac Clean
Malwarebytes Generic.Malware/Suspicious
Zillya Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
Cybereason malicious.19652e
BitDefenderTheta Clean
VirIT Clean
Cyren W32/Kryptik.KIS.gen!Eldorado
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 Clean
APEX Malicious
Paloalto Clean
ClamAV Win.Packer.pkr_ce1a-9980177-0
Kaspersky UDS:DangerousObject.Multi.Generic
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Trojan.Kryptik!1.B663 (CLASSIC)
Emsisoft Clean
Baidu Clean
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Lockbit.dh
Trapmine malicious.high.ml.score
CMC Clean
Sophos ML/PE-A
SentinelOne Static AI - Malicious PE
GData Clean
Jiangmin Clean
Webroot Clean
Google Detected
Avira Clean
MAX Clean
Antiy-AVL Clean
Gridinsoft Trojan.Win32.Wacatac.dd!n
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Cynet Malicious (score: 100)
AhnLab-V3 Clean
Acronis suspicious
McAfee Clean
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Malware-Cryptor.Grygoryi.3
Cylance unsafe
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Trojan.Win32.Obfuscated.gen
Yandex Clean
Ikarus Trojan-Spy.MSIL.Agent
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/GenKryptik.ERHN!tr
AVG Win32:BootkitX-gen [Rtk]
Avast Win32:BootkitX-gen [Rtk]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.