Static | ZeroBOX

PE Compile Time

2022-08-31 01:01:46

PE Imphash

7fc4620c6e634458b30287f38bce9732

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000253d2 0x00025400 7.46559332573
.data 0x00027000 0x00388cec 0x00002200 2.15740688253
.rsrc 0x003b0000 0x00003b90 0x00003c00 3.89297022748

Resources

Name Offset Size Language Sub-language File type
AFX_DIALOG_LAYOUT 0x003b31f0 0x00000002 LANG_NEUTRAL SUBLANG_NEUTRAL data
AFX_DIALOG_LAYOUT 0x003b31f0 0x00000002 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_ICON 0x003b2838 0x00000988 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_ICON 0x003b2838 0x00000988 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_STRING 0x003b3ad0 0x000000ba LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_STRING 0x003b3ad0 0x000000ba LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_STRING 0x003b3ad0 0x000000ba LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_STRING 0x003b3ad0 0x000000ba LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_GROUP_ICON 0x003b31c0 0x00000022 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_VERSION 0x003b31f8 0x00000210 LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library KERNEL32.dll:
0x401008 FindFirstFileW
0x401010 lstrlenA
0x401014 GetModuleHandleExA
0x401018 GetLocaleInfoA
0x40101c SetLocalTime
0x401020 GetDriveTypeW
0x401024 CommConfigDialogA
0x40102c GlobalAddAtomA
0x401030 GetConsoleAliasA
0x401034 GetCurrentActCtx
0x40103c WriteConsoleInputA
0x401040 OpenSemaphoreA
0x401048 _lclose
0x40104c CreateNamedPipeW
0x401058 GetConsoleAliasesA
0x401064 WaitNamedPipeW
0x401068 GetCommandLineA
0x40106c SetCommTimeouts
0x401074 LoadLibraryW
0x401078 CopyFileW
0x40107c _hread
0x401080 CreateEventA
0x401084 GetFileAttributesA
0x40108c ReplaceFileW
0x401090 ReadFile
0x401098 FindResourceA
0x40109c lstrlenW
0x4010a0 GetStartupInfoW
0x4010a4 SetConsoleTitleA
0x4010a8 GetShortPathNameA
0x4010ac EnumSystemLocalesA
0x4010b0 GetLastError
0x4010b8 SetLastError
0x4010c0 AttachConsole
0x4010c4 VerLanguageNameA
0x4010c8 SetVolumeLabelW
0x4010cc RemoveDirectoryA
0x4010d0 CopyFileA
0x4010d4 SetComputerNameA
0x4010d8 GetProcessVersion
0x4010e0 LocalAlloc
0x4010e4 GetCommMask
0x4010ec AddAtomA
0x4010f0 FoldStringW
0x4010f4 FindNextFileA
0x4010f8 GetModuleHandleA
0x4010fc GetCommTimeouts
0x401100 lstrcatW
0x401104 FindNextFileW
0x401108 VirtualProtect
0x40110c GetFileTime
0x401114 ReadConsoleInputW
0x401118 TerminateJobObject
0x40111c FindAtomW
0x401124 ResetWriteWatch
0x401128 DeleteFileA
0x40112c lstrcpyA
0x401130 CreateFileW
0x401134 CompareStringW
0x401138 GetTempFileNameW
0x40113c WriteConsoleW
0x401140 FlushFileBuffers
0x401144 WideCharToMultiByte
0x401148 HeapFree
0x40114c HeapAlloc
0x401150 GetProcAddress
0x401154 GetModuleHandleW
0x401158 ExitProcess
0x40115c DecodePointer
0x401160 EncodePointer
0x401164 HeapReAlloc
0x401168 GetCommandLineW
0x40116c HeapSetInformation
0x401174 GetCPInfo
0x401180 GetACP
0x401184 GetOEMCP
0x401188 IsValidCodePage
0x40118c TlsAlloc
0x401190 TlsGetValue
0x401194 TlsSetValue
0x401198 TlsFree
0x40119c GetCurrentThreadId
0x4011a4 IsDebuggerPresent
0x4011a8 TerminateProcess
0x4011ac GetCurrentProcess
0x4011b0 HeapCreate
0x4011bc SetHandleCount
0x4011c0 GetStdHandle
0x4011c8 GetFileType
0x4011d0 WriteFile
0x4011d4 GetModuleFileNameW
0x4011d8 Sleep
0x4011dc HeapSize
0x4011e0 CloseHandle
0x4011f0 GetTickCount
0x4011f4 GetCurrentProcessId
0x4011fc LCMapStringW
0x401200 MultiByteToWideChar
0x401204 GetStringTypeW
0x401208 SetFilePointer
0x40120c GetConsoleCP
0x401210 GetConsoleMode
0x401214 RaiseException
0x401218 RtlUnwind
0x40121c SetStdHandle
Library USER32.dll:
0x401224 CharUpperW
Library ADVAPI32.dll:
Library WINHTTP.dll:
0x40122c WinHttpWriteData

!This program cannot be run in DOS mode.
`.data
CorExitProcess
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
(null)
`h````
xpxxxx
?ZEM-'^
?{yK+;
?765@Z
?e')lW
UUUUUU
333333
?333333
?UUUUUU
?$rxxx
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
`h`hhh
xppwpp
_nextafter
_hypot
GetProcessWindowStation
GetUserObjectInformationW
GetLastActivePopup
GetActiveWindow
MessageBoxW
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
1#QNAN
1#SNAN
tukalonikuginopofa
jodepabopozol
xatenamolijejexucaroz
gukelonodumutamekexizovikidutuxu
kizoruvezikeyuxivibowoy yexuvixahogopeg faz keyewilovizubuhuse
0.1 %f
porewolifunizijuzapoweje lehubokovefosesu husuvotuhoduherazowizamesozagatu yokasatihabomomapegosev
regaraxejuzitalixafadonowi hitobupikepefasatorojovu zemakomonarexawunaz soxulikidelegikov fagokovuna
koyaducasaxaxih nonuporihuvamegiverowagijawux denayekuloguzim
fuxufomuj
babagufagihoretageyutumodalix
lobotapiha
wohulacamodewogetiso wir genisuhivacocezabebinole lipegozidasasajiximeyijevesi nifojikizerexadivot
Xof hayehaduk hepafa
j h0TB
to=8}B
F\=h:@
Y;=xwB
tWItHIt9It
r=p{B
j@j ^V
uhl!@
^SSSSS
QQSVWh
t"SS9] u
v4;5l}B
URPQQh
u}hPD@
tRHtCHt4Ht%HtFHHt
;t$,v-
UQPXY]Y[
PPPPPPPP
PPPPPPPP
<+t"<-t
+t HHt
LH; !;
Lvv@j
k(+ypg;
tE$Aa+m
nn9z^~
8-}s8xL
gS@W{o
q=U_iX&|
l-*t-DG
sb[@L:
ltK}!V
g(G-J`
-Y'|vp^u
Yy.vhc
PT8c[C
~-a|+f
3u!g=.
aK>TV:A5
}2(k8#c
1m=^(nc
Qq@ELb!fLK^
G-*.=>
KwT?]c
Ow=7W;
xp9+(6
|LQ%D
86h~v5
%=U{,s
qY5d/*
[Dl"Il,
S$1MCM
}~z]~}
y_P]Hk
" ?c My
i/WZ}Y
!P*/eP
d!{cuB
e)F(H.7G`c
BW;|(9f
@mzv{K~
0!zK!G
:1j*\k
/UHUuYXK
,D!S]M
5]-#Wbl/G
Ua{4.V
+KfQ"S2
W7BZ+Ij
xoviI7
{9cFAi*
KvrV+V
A, HdZy[
y?.B|_a;b8
5 ^&LCD
,S"{iiK\L
b`]lRV
M~3_-Ja
]o(i+K
4hoDtd
w\at"p
y-1P|9
R"J\`-V
(i\42)
wRn,Hw
ztN}m_
Ut6j$ O
wmWDyR/
KO=7ik\8Dw
g[$+mW
DG-rZ*
=(9Nsi
44!+~b;O
06C|d$
D-#@v@
gQQ7iN
ta|-8TH
$$|WzMWVj
70g}O]
/L0),T(
x~NF:gZ
B7~26o
|lnu+ZA
6j|m%n
#jPz{.
VhxSai
6Y+Z1g
/8D+Dn
@e>}2\
i`NNo.
wWHtwmG
MP/Mr0h
rQt >9d
l4{zJ2_
N-E.thP
?<?W-d
B@BVS=
(PqG_^
sPaF:[
)c2bF!V
HpfzJ<u0
yCU`?'g
}9AsTd
\ME)B-=
D[F^%x{
t#{6u\
WCf=6d/
9IE>V@
8T\'V.M
XhtJ]~
Pe'lk6
V,=Lz8
uAY'9$
B$2BBx
=c"Xpa
zzpIj^
ZEnJqcF.
8LGuK6
zoVrg9
0&-//u
P ZY )
A=uT6M
$Si8Pp
6o?.6/G
tYbDr"
n&JJ-83
)<t(Q*(l
wr/fy0^I
z!Hi6{yqw}
IiIyG&
&!`xk1
BG#$i}m
gS<0vZ
A,"n'~
?;F[~k
Y3{{;
WmD?t&O.+^f%
UocU/._
dMd[R
0ac}Wr
[pw>q
\sK.K<
.6^+s_#
n6O<$Q
`b7n-|
D$xPh(E@
D$4PQQh
L$TQRR
D$8Ph@M@
GetTempFileNameW
FindResourceA
FindFirstFileW
WriteConsoleOutputCharacterW
lstrlenA
GetModuleHandleExA
GetLocaleInfoA
SetLocalTime
GetDriveTypeW
CommConfigDialogA
MapUserPhysicalPages
GlobalAddAtomA
GetConsoleAliasA
GetCurrentActCtx
SetDefaultCommConfigW
WriteConsoleInputA
OpenSemaphoreA
GetSystemDefaultLCID
_lclose
CreateNamedPipeW
GenerateConsoleCtrlEvent
FindNextVolumeMountPointA
GetConsoleAliasesA
GetWindowsDirectoryA
GetConsoleAliasExesW
WaitNamedPipeW
GetCommandLineA
SetCommTimeouts
GetEnvironmentStrings
LoadLibraryW
CopyFileW
_hread
CreateEventA
GetFileAttributesA
EnumSystemCodePagesA
ReplaceFileW
ReadFile
GetCompressedFileSizeA
CompareStringW
lstrlenW
GetStartupInfoW
SetConsoleTitleA
GetShortPathNameA
EnumSystemLocalesA
GetLastError
GetCurrentDirectoryW
SetLastError
ReadConsoleOutputCharacterA
AttachConsole
VerLanguageNameA
SetVolumeLabelW
RemoveDirectoryA
CopyFileA
SetComputerNameA
GetProcessVersion
UnhandledExceptionFilter
LocalAlloc
GetCommMask
SetThreadIdealProcessor
AddAtomA
FoldStringW
FindNextFileA
GetModuleHandleA
GetCommTimeouts
lstrcatW
FindNextFileW
VirtualProtect
GetFileTime
QueryPerformanceFrequency
ReadConsoleInputW
TerminateJobObject
FindAtomW
MoveFileWithProgressW
ResetWriteWatch
DeleteFileA
lstrcpyA
KERNEL32.dll
CharUpperW
USER32.dll
AbortSystemShutdownA
ADVAPI32.dll
WinHttpWriteData
WINHTTP.dll
WideCharToMultiByte
HeapFree
HeapAlloc
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
EncodePointer
HeapReAlloc
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
WriteFile
GetModuleFileNameW
HeapSize
CloseHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
GetConsoleCP
GetConsoleMode
RaiseException
RtlUnwind
SetStdHandle
FlushFileBuffers
WriteConsoleW
CreateFileW
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
|~~|z~
|{~~|}}{z
z~{|}|y
{z~~~z~
{~}~~zz
{|{|}{
|||}}}
|{~z}}
}~{{}|
z{|}y~
}z}~z|z
{y{|||
}}~y~{
~~}~{~~
~|{}y|
mscoree.dll
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
nKERNEL32.DLL
(null)
wruntime error
TLOSS error
SING error
DOMAIN error
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
- abort() has been called
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
@Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
((((( H
h(((( H
H
WUSER32.DLL
CONOUT$
lupetonubawomuwemubowid cetubozukakomiruvos ziyexubasevopoyubiniwewi zuvaxezisav watadamalafegugutisabinoda
nutemamoyoniwerupazatebacutuz puhamotesidilefodilege coromufopayicigojemuhewudu
habopoherucuzozatedizuhulaxedeka viyumipogetimibozimilorulihuho mawamupepezuyosagajinegiduvilid sukucubefis yozafoxigeropic
saticobolavebosalac
jiruteyuvodubi
lizerusetaja woz
ducevibepamujidodizero
ninopowekexomaxupidaxu
culosuhunigefunofusicasid
xuwodohazurerejapokelugiw
xizicevucuwuruvaj
zareruyadaroyihixofonuvucijabize zituhuvegolivicupiyufel
nobuzopipeyopocesucocavija
keconeluboxavajim
cesesusozocuruhotecebenemoy fogakunaficiyafasasogocahodomel baremitumadatitapowizayepabak zeliwapatusebefusulep
gumahakiwisix
kuwadumediyabitilafuced gupafikix funuwa ruhocuhayipanukave cezosuyejofigevupuxepoxipugedoz
duzibexomilinebecepunufijecuje
@jjjjj
@jjjjjjj
@jjjjjjj
AFX_DIALOG_LAYOUT
VS_VERSION_INFO
StringFileInfo
037285B3
InternalName
Octubrefest.exe
LegalTrademark1
Clavion
LegalTrademarks2
Gunshot
OriginalFilename
Techniques.exe
ProductVersion
1.25.85.24
VarFileInfo
Translation
Lay towom*Bahogeyer xetatahevazepev lawomepi bokapih
KatexaficaXBev sikipibabetucel hejihajabahoju mofo yab rihociloyizipan jagagasosadox dozo kemebeliz+Duwupezuwagiji minudacoko befazudewinu noxe
4Telezuxirodet zot zodokahoteju korosivud pihetewetij
RVitetopij geki hake nexigohokahena ficanakecu yehelomuhi gisipibahutira xidavamoxe.Yaxexepak yanekiv matawuzegaguc kamozuyuyepepe Bomalusavobix yaxoc lotolisudovo
RHig gonicofediyoge lizoyeyuyitip lahejucul pinim moyucapo beke zaguz filakamuluguf.Xihe harivumusutisef tumacacawuzub tevirokeyuk@Zodegiso zadovitalujapi yumoxadozog luxakarunifux gunazocutuxihoXPokulecide vovewufexa mopore sabasuhetepuzi zehurejegocula nomuvodes tugoru wugapilahupo
EKajatupibojacu ditufitugam yewixevopan vipexahifaxok geli jahek laduv
Gogoxeyuyo denovonob muna#Jumuf vosufigateb wodamibocefow zug
MPozeburow vevopiyibiselay mowaladucaz cuka muxakibemama dudaza sifedogijerosa
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Clean
Elastic malicious (high confidence)
DrWeb Clean
MicroWorld-eScan Clean
CMC Clean
CAT-QuickHeal Ransom.Stop.P5
Skyhigh BehavesLike.Win32.Lockbit.cc
ALYac Clean
Malwarebytes Clean
Zillya Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Clean
Alibaba Clean
K7GW Hacktool ( 700007861 )
Cybereason malicious.7af3fe
BitDefenderTheta Clean
VirIT Clean
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 Clean
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Clean
NANO-Antivirus Clean
SUPERAntiSpyware Clean
Avast BotX-gen [Trj]
Tencent Trojan.Win32.Obfuscated.gen
Emsisoft Clean
F-Secure Clean
Baidu Clean
VIPRE Clean
TrendMicro Clean
Trapmine malicious.high.ml.score
FireEye Generic.mg.b493dabf9da2cf24
Sophos ML/PE-A
SentinelOne Static AI - Malicious PE
MAX Clean
Jiangmin Clean
Webroot Clean
Google Detected
Avira Clean
Varist Clean
Antiy-AVL Clean
Kingsoft malware.kb.a.1000
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Gridinsoft Clean
Xcitium Clean
Arcabit Clean
ViRobot Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
GData Clean
Cynet Malicious (score: 100)
AhnLab-V3 Clean
Acronis suspicious
McAfee Artemis!B493DABF9DA2
TACHYON Clean
VBA32 Malware-Cryptor.Azorult.gen
Cylance unsafe
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Trojan.Generic@AI.95 (RDML:dNaFnF4f1WS2it6HUcEEAQ)
Yandex Clean
Ikarus Trojan.Win32.Ranumbot
MaxSecure Trojan.Malware.300983.susgen
Fortinet Clean
AVG BotX-gen [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.