Static | ZeroBOX

PE Compile Time

2022-09-15 19:03:04

PDB Path

C:\puruwul46\basole.pdb

PE Imphash

b843f9632af58019508eefd6a2b3c3d6

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0002c04a 0x0002c200 7.50229043273
.data 0x0002e000 0x0147cc1c 0x00002000 2.94999776196
.rsrc 0x014ab000 0x000076c8 0x00007800 4.06929105373
.reloc 0x014b3000 0x0000b658 0x0000b800 0.908150163387

Resources

Name Offset Size Language Sub-language File type
RT_CURSOR 0x014b1880 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x014b1880 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x014b1880 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x014b1880 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x014b1880 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x014b1880 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x014adfb0 0x00000468 LANG_PORTUGUESE SUBLANG_PORTUGUESE_BRAZILIAN GLS_BINARY_LSB_FIRST
RT_ICON 0x014adfb0 0x00000468 LANG_PORTUGUESE SUBLANG_PORTUGUESE_BRAZILIAN GLS_BINARY_LSB_FIRST
RT_ICON 0x014adfb0 0x00000468 LANG_PORTUGUESE SUBLANG_PORTUGUESE_BRAZILIAN GLS_BINARY_LSB_FIRST
RT_STRING 0x014b2048 0x0000067e LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x014b1de8 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x014b1de8 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x014ae418 0x00000030 LANG_PORTUGUESE SUBLANG_PORTUGUESE_BRAZILIAN data
RT_VERSION 0x014b1e18 0x00000230 LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library KERNEL32.dll:
0x401000 GetDateFormatW
0x401008 WriteConsoleInputW
0x401018 GetComputerNameW
0x40101c GetTickCount
0x401020 GetCurrentThread
0x401024 CreateActCtxW
0x401028 LoadLibraryW
0x40102c ReadConsoleInputA
0x401030 TransactNamedPipe
0x401034 GetNamedPipeInfo
0x401038 HeapValidate
0x40103c GetACP
0x401040 DisconnectNamedPipe
0x401044 GetConsoleAliasesW
0x401048 GetProfileIntA
0x40104c GetLastError
0x401050 GetProcAddress
0x401054 VirtualAlloc
0x401058 LoadLibraryA
0x40105c DeleteTimerQueue
0x401060 Module32FirstW
0x401064 FoldStringW
0x401068 CreatePipe
0x40106c EnumResourceTypesW
0x401070 FindNextFileA
0x401074 HeapSetInformation
0x401078 UpdateResourceW
0x40107c TlsAlloc
0x401080 AreFileApisANSI
0x401084 WriteConsoleW
0x401088 GetConsoleOutputCP
0x40108c WriteConsoleA
0x401090 ReadFile
0x401098 Sleep
0x4010b4 HeapFree
0x4010b8 TerminateProcess
0x4010bc GetCurrentProcess
0x4010c0 IsDebuggerPresent
0x4010c4 GetModuleHandleW
0x4010c8 ExitProcess
0x4010cc GetStartupInfoW
0x4010d0 RtlUnwind
0x4010d4 RaiseException
0x4010d8 LCMapStringA
0x4010dc WideCharToMultiByte
0x4010e0 MultiByteToWideChar
0x4010e4 LCMapStringW
0x4010e8 GetCPInfo
0x4010ec WriteFile
0x4010f0 GetStdHandle
0x4010f4 GetModuleFileNameA
0x4010f8 HeapAlloc
0x4010fc HeapCreate
0x401100 VirtualFree
0x401104 HeapReAlloc
0x401108 TlsGetValue
0x40110c TlsSetValue
0x401110 TlsFree
0x401114 SetLastError
0x401118 GetCurrentThreadId
0x40111c SetFilePointer
0x401124 GetModuleFileNameW
0x401130 GetCommandLineW
0x401134 SetHandleCount
0x401138 GetFileType
0x40113c GetStartupInfoA
0x401144 GetCurrentProcessId
0x40114c HeapSize
0x401150 GetOEMCP
0x401154 IsValidCodePage
0x401158 GetLocaleInfoA
0x40115c GetStringTypeA
0x401160 GetStringTypeW
0x401164 CloseHandle
0x401168 CreateFileA
0x40116c GetModuleHandleA
0x401170 SetStdHandle
0x401174 GetConsoleCP
0x401178 GetConsoleMode
0x40117c FlushFileBuffers
0x401180 SetEndOfFile
0x401184 GetProcessHeap
Library USER32.dll:
0x40118c LoadMenuA
0x401190 CharLowerBuffW
0x401198 CharToOemBuffW
0x40119c CharUpperBuffW

!This program cannot be run in DOS mode.
`.data
@.reloc
bad allocation
Unknown exception
CorExitProcess
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
bad exception
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
(null)
`h````
xpxxxx
UTF-16LE
UNICODE
RUUUUU
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
`h`hhh
xppwpp
_nextafter
_hypot
i^^?(>
Y:/(A6>
<e+000
GAIsProcessorFeaturePresent
KERNEL32
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
?1#QNAN
1#SNAN
CONOUT$
bad allocation
VirtualAlloc
C:\puruwul46\basole.pdb
WWWWWW
/SVWuQ3
VVVVVVV
0WWWWW
QQSVWd
HtHu4j
s[S;7|G;w
tR99u2
t"SS9]
u&h@!@
0SSSSS
F\=(%@
HHtXHHt
>If90t
<at9<rt,<wt
URPQQh\
tNIt?It0It
>=Yt1j
QQSVWh
j@j ^V
0A@@Ju
0SSSSS
PPPPPPPP
0SSSSS
PPPPPPPP
t+WWVPV
tRHtCHt4Ht%HtFHHt
^SSSSS
j"^SSSSS
tGHt.Ht&
^SSSSS
8VVVVV
;t$,v-
UQPXY]Y[
_VVVVV
^WWWWW
0WWWWW
AAFFf;
0SSSSS
_VVVVV
<+t(<-t$:
+t HHt
8jAcW-1
e}`DDx?
mI$.ea
_(_qR5
%_DPO}h
a{A/<nq
03G(;
4r@(D|
U*QrdA
,(Q[.Tob
|o_=`l
1'j3K<*c
hfHE#"
qZv+Xy]F9
Z#QW'2b
[!Qf$D
Bc0k/y,
ip].JX
="feh@+
|1>z_U
CfdcM[;m
#Y,#"7
\8Jsl'
EML!wq
Nl_K@=
Xraw::
y'bqy;
'HbOY
WjN1?_-
'W[B`*
`L.Cdj}
\%wj[[
9]ZWb
9E[dnE
,arY0*e
IUlJdr6Lp
7U^|J(H
yYC'T6
_it5b/}
>B=en<3
~0*aj1
4Xo|lF
'u8v2$h
&MUMx/
13+6KZDd
FT%xfX
$_$a5z&7
^lexRI
_}9!AZ
C4?fXN
:IDJ)%f
Bbsa[rr
oQm!DGL*u{
a)bS&3
e7Sh0.
Cyib;a
W::+:/
r)81I
Z9CucG
mMw!F@
v`r0$X
9d0J'n
{}oo`[
%^zFUD
.&7_f/W%
Fo+c=9s
d;tT7{4(3o
2_z%5i
w$AUH=
*YDdfh7U
xK0m4h7
u39@25
s'KCe_
l/m{>?
6k:(/z
%V:=pZ
7!D0mJ
aTg!F$
+*qf$)(E
iW*al;
+!*$j(
LwVco'
{OtVjn
#Hua``n
W+hm.
HG(By.Ad
E}oWXt
:KY&sN
}^P4${0
(z!"gj
jHew6O
ff7)[j
dIAsuB
h3<b/+
jAQJ:p*z
x-;k;s
x}>nS^
BRkbhAxaP
Q:nS1hl
N'*uFRn
yBOcU$sro
GzY%hb
wR&FIF
N(x/KM
$r6hTl?6
)n`^OT9
vVmZ^Yz#$%
Z"HC#R
rWW)1fi
Sze*=GKB
|qUE6%
3NE1)t
l-[3H)
@ 7<mJ0yNk|j
Q\BpL1
(5zus
S}%*=!
0~LQGD
c>Rn?1
S g wq
:{?(1P
@J4v{!
xSr^j/
?RTZFn
5"SY~a
:YZdaqD
W+i9^lR
F+}e<(=
})n4F'li|(
-]-=3w"m
7ve:'~
9&\F%6
)xCfVZ
2mpdYLY
(PVl&U
iUC|lHN
oq.[;Q)
V5y~3G
oRrM4g
wjzF?5
L:f^(:S
H@j7.9
}5u^g0
svPd]$
__0G$E
,p0mn5E
80|aBz
GetDateFormatW
FillConsoleOutputCharacterA
WriteConsoleInputW
GetConsoleAliasesLengthW
InterlockedIncrement
InterlockedCompareExchange
GetComputerNameW
GetTickCount
GetCurrentThread
CreateActCtxW
LoadLibraryW
ReadConsoleInputA
TransactNamedPipe
GetNamedPipeInfo
HeapValidate
GetACP
DisconnectNamedPipe
GetConsoleAliasesW
GetProfileIntA
GetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
DeleteTimerQueue
Module32FirstW
FoldStringW
CreatePipe
EnumResourceTypesW
FindNextFileA
HeapSetInformation
UpdateResourceW
TlsAlloc
AreFileApisANSI
KERNEL32.dll
CharToOemBuffW
CreateAcceleratorTableA
CharLowerBuffW
LoadMenuA
CharUpperBuffW
USER32.dll
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetModuleHandleW
ExitProcess
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetFilePointer
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
CloseHandle
CreateFileA
GetModuleHandleA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetEndOfFile
GetProcessHeap
ReadFile
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
Copyright (c) 1992-2004 by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
.?AVtype_info@@
.?AVbad_exception@std@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVexception@std@@
.?AVbad_alloc@std@@
yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy:d
yyyyyyyyyyyyyyyyyyyy;
TE,yyyyyyyyyyyyyyyyyy
Ryyyyyyyyyyyyyyyy
yyyyyyyyyyyyyyy
ZByyyyyyyyyyyyyy
yyyyyyyyyyyyyyy:
Ryyyyyyyyyyyyyyy
yyyyyyyyyyyI4sy
yyyyyyyyyy4$%_w
(yyyyyyyyyy
yyyyyyyyyyyy
yyyyyyyyyyyy4i
5[yyyyyyyyyyyyy4.
yyyyyyyyyyyy
yyyyyyyyyyyy
4yyyyyyyyyyyyyyyyyy4
XyyyyyyyyyyyyyyyyyyI4
yyyyyyyyyyyyyyyyyy4
yyyyyyyyyyyyyyyyyy
yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
z~~~}~
{~}||~}
{~||}|z}{|
||{~z~
|z|~|}z
~||~}|
}|~~{~
z}~~}}
{|z~y~
|{}~}}
|}}}}~~
}}{}|~}{
~|}~z~|~
{z|{}z
|{{}~{
}}~|~|
{}}z||}
|~~}}|yy
{|z|}y
}y|}|}






1024282@2D2H2
6 6$6(6,6064686<6@6D6H6L6P6T6X6\6`6d6h6l6p6t6x6|6
7 7$7(7,7074787<7@7D7H7L7P7T7X7\7`7d7h7l7p7t7x7|7
:$:(:8:<:@:H:`:p:t:|:
::<O<Z<_<e<
>+>2>G>W>]>g>
?6?B?L?S?[?s?y?
0K0Q0s0
0*1/14191I1Z1j1r1w1
5"515P5m5
1+2F2L2U2\2~2
3"3)343=3S3^3x3
3(4-484=4[4
5G5M5U5b5v5
/0<0O0
;2=:=O=Z=
1*2_2x2
3 3$3n3t3x3|3
4 4A4k4
6"6.6p6
6!7/7v7{7
7L8U8[8
8*9B9M9q9z9
:A:T:l:~:
:;8;?;G;L;P;T;};
;.<4<8<<<@<
=+=]=d=h=l=p=t=x=|=
=2>N>q>
H0M0[0h0o0y0
2_4m4s4
5)5/5:5?5G5M5W5^5r5y5
>$><>T>
?0?v?|?
1A2Q2]2o2
2b3p3v3
4$484?4W4c4i4u4
5A5V5|5
6+737}7
8"8'868L8W8\8g8l8w8|8
9&959B9N9^9e9t9
:I:X:a:
;4;<;[;k;};
<O=W=d=
>1>:>U>a>m>y>
? ?)?2?>?J?S?\?
1.1:1F1R1~1
1$2.262W2k2
3#3+313H3N3_3v3}3
5;6<7L7]7e7u7
8!8A8[8
:<:G:j:
0\1k1z1
1Z2`2h2s2
2P3[3e3v3
56%6W6
8D8g8t8
: :':/:7:?:K:T:Y:_:i:r:}:
0%0/0H0R0e0
3)31393P3i3
8(9a9n9M:\:1=d=
E0S0Y0i0n0
091V1s1
353I3T3
595Z5f5
5'6=7D7
=S=c=~=
"0*0h0
9;9E92;
:u;2<?<X<v<
T0b0j0w0
224(505
8v9l:t:';
<J=P=`=
5"5&5*5.525?5
626A6m6
?'?3?=?I?S?_?k?u?
0 0@0\0`0h0l0
1$10181h1p1t1
2(2H2h2
3$3@3\3`3|3
4 4@4`4
5 5,5H5h5
6$606P6\6|6
1$1,141<1D1L1T1\1d1l1t1|1
1j4n4r4v4
9 9$9(9,9094989<9@9D9H9L9P9T9X9\9`9d9h9l9p9t9x9|9
0$0,040<0D0L0T0\0d0l0t0|0
2"2&2*2.22262:2>2B2F2J2N2R2V2Z2^2b2f2j2n2r2v2z2~2
mscoree.dll
((((( H
h(((( H
H
KERNEL32.DLL
(null)
kernel32.dll
kernel32.dll
demuwubuzimopilujicaxujofoj
msimg32.dll
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
VS_VERSION_INFO
StringFileInfo
042831F2
FileDescription
ElecticStone
LegalCopyright
Copyright (C) 2023, histsric
ProductsVersion
28.18.52.68
ProductName
ProductionVersion
4.90.79.94
VarFileInfo
Translation
YYogukonazeci bezujoviy zatotewene jocuc runuc cico gerufusutulaxex nixuxexix hojudo waxugXPenil zukej kipuwiyakefah kotemifiyob hosuco key coyobav tolegametiw xatir todawapubibeh
Sexodutize`Jocajehec cebisabomaxeli mutofaf yuzufuy fojevabaxe fuvucihofa bifepena pan bosatehuyi hinafigij1Cem yijiyeribiko kuk bereno keyorel rilalevozatax
Bekix vimesihol
Herume ruyofuy lohasiyacaje3Nar watimufiw puzeza juzawa zaropolodolafi mebitutezNejopapuvako najuwahizuwas reledamofepiwi himovevuxavu fejowipilaveh puzupok cuwufodafotuz nohiwejonayuze yowabaj wetagaru
Zimodew0Fekas dusuyap yek xumayo vis pacubu fepagig gobaHYugasixohiw xewekayoxuwem zihat segobigivete toxumacaruwu dukizikuwofaraRJire dijes busehevakop nepivonati birexub xibeyiwijij bijucuhifanuki hikivoxumetem
Ganesi5Vuyuc gozekahikelevo nanozel xurufidobo kalep diwogul
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
tehtris Generic.Malware
ClamAV Win.Packer.pkr_ce1a-9980177-0
FireEye Generic.mg.a76e515e1150c903
CAT-QuickHeal Ransom.Stop.P5
ALYac Clean
Malwarebytes Clean
Zillya Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 0056f9be1 )
BitDefender Clean
K7GW Trojan ( 0056f9be1 )
CrowdStrike win/malicious_confidence_100% (W)
Arcabit Clean
Baidu Clean
VirIT Clean
Cyren W32/Kryptik.KJB.gen!Eldorado
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 Clean
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky UDS:DangerousObject.Multi.Generic
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Clean
Rising Trojan.Kryptik!1.B663 (CLASSIC)
Sophos Mal/Generic-S
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Lockbit.dh
Trapmine malicious.high.ml.score
CMC Clean
Emsisoft Clean
SentinelOne Static AI - Suspicious PE
Jiangmin Clean
Webroot Clean
Avira Clean
MAX Clean
Antiy-AVL Clean
Gridinsoft Trojan.Win32.SmokeLoader.bot
Xcitium Clean
Microsoft Trojan:Win32/Sabsik.FL.B!ml
SUPERAntiSpyware Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
GData Clean
Google Detected
AhnLab-V3 Clean
Acronis suspicious
McAfee Artemis!A76E515E1150
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Clean
Cylance unsafe
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Trojan.Win32.Obfuscated.gen
Yandex Clean
Ikarus Worm.Win32.Dorkbot
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/GenKryptik.ERHN!tr
BitDefenderTheta Clean
AVG FileRepMalware [Pws]
Cybereason malicious.088744
Avast FileRepMalware [Pws]
No IRMA results available.