Static | ZeroBOX

PE Compile Time

2024-06-13 10:15:39

PE Imphash

66a76438aae4895269af9cbab80f4b40

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00005702 0x00005800 6.21824271305
.rdata 0x00007000 0x000033ca 0x00003400 4.60043387568
.data 0x0000b000 0x00002340 0x00001000 2.26025755668
.pdata 0x0000e000 0x000005d0 0x00000600 4.23437499144
.reloc 0x0000f000 0x000003b0 0x00000400 3.68070526163
.rsrc 0x00010000 0x0002e88c 0x0002ea00 6.45199796929

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0003e0b4 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0003e0b4 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0003e0b4 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0003e0b4 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0003e0b4 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0003e0b4 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x0003e51c 0x0000005a LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x0003e578 0x00000314 LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library KERNEL32.dll:
0x140007000 LoadLibraryW
0x140007008 GetProcAddress
0x140007010 GetCommandLineW
0x140007018 GetStartupInfoW
0x140007020 GetLastError
0x140007028 HeapFree
0x140007030 EncodePointer
0x140007038 DecodePointer
0x140007040 HeapAlloc
0x140007048 RaiseException
0x140007050 RtlPcToFileHeader
0x140007060 GetModuleHandleW
0x140007068 ExitProcess
0x140007070 WriteFile
0x140007078 GetStdHandle
0x140007080 GetModuleFileNameW
0x140007088 RtlUnwindEx
0x140007090 FreeEnvironmentStringsW
0x140007098 GetEnvironmentStringsW
0x1400070a0 SetHandleCount
0x1400070b0 GetFileType
0x1400070b8 DeleteCriticalSection
0x1400070c0 FlsGetValue
0x1400070c8 FlsSetValue
0x1400070d0 FlsFree
0x1400070d8 SetLastError
0x1400070e0 GetCurrentThreadId
0x1400070e8 FlsAlloc
0x1400070f0 HeapSetInformation
0x1400070f8 GetVersion
0x140007100 HeapCreate
0x140007108 QueryPerformanceCounter
0x140007110 GetTickCount
0x140007118 GetCurrentProcessId
0x140007120 GetSystemTimeAsFileTime
0x140007128 Sleep
0x140007130 HeapSize
0x140007138 LeaveCriticalSection
0x140007140 EnterCriticalSection
0x140007148 UnhandledExceptionFilter
0x140007150 IsDebuggerPresent
0x140007158 RtlVirtualUnwind
0x140007160 RtlLookupFunctionEntry
0x140007168 RtlCaptureContext
0x140007170 TerminateProcess
0x140007178 GetCurrentProcess
0x140007180 GetCPInfo
0x140007188 GetACP
0x140007190 GetOEMCP
0x140007198 IsValidCodePage
0x1400071a0 HeapReAlloc
0x1400071a8 WideCharToMultiByte
0x1400071b0 LCMapStringW
0x1400071b8 MultiByteToWideChar
0x1400071c0 GetStringTypeW
Library USER32.dll:
0x1400071d0 MessageBoxW

!This program cannot be run in DOS mode.
`.rdata
@.data
.pdata
@.reloc
B.rsrc
UHcA<E3
VWAUAWH
hA_A]_^
hA_A]_^
H@fD9i
H@fD9i
ATAUAVH
A^A]A\
WATAUAVAWH
@A_A^A]A\_
t$ WATAUH
WATAUAVAWH
A_A^A]A\_
fD9#tSH
CfD9#u
fD91u:A
Hct$PH
shHcD$XH
tLf9t
ATAUAVH
fD9t$b
A^A]A\
fffffff
fffffff
WATAUAVAWH
0A_A^A]A\_
LcA<E3
@SUVWATAUAVH
PA^A]A\_^][
UVWATAUH
D$&8\$&t-8X
@A]A\_^]
@UATAUAVAWH
!t$(H!t$ A
A_A^A]A\]
@UATAUAVAWH
A_A^A]A\]
bad allocation
Unknown exception
CorExitProcess
GetProcessWindowStation
GetUserObjectInformationW
GetLastActivePopup
GetActiveWindow
MessageBoxW
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__eabi
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
GetProcAddress
InternetOpenW
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
VirtualProtect
CreateThread
WaitForSingleObject
LoadLibraryW
GetProcAddress
KERNEL32.dll
MessageBoxW
USER32.dll
GetCommandLineW
GetStartupInfoW
GetLastError
HeapFree
EncodePointer
DecodePointer
HeapAlloc
RaiseException
RtlPcToFileHeader
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
RtlUnwindEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
HeapSetInformation
GetVersion
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
LeaveCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
.?AVbad_alloc@std@@
.?AVexception@std@@
.?AVtype_info@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
4 6;'V
%27;6;
!KsKhNiV
|zjzavbt
296&[Gw
|^'fXo
[ed|J&vl
-[efn^&
tX,F_gG
#239)S;v
y:)sc#
mX'^(@
UkVI/6
*kn~~Ny
h\&FGe
N<Nf''
TY1iT-
q]MV;VJb
"sBqY1E
rMVYMK
bj8-?c
/PoV%_+
'6 1Zy
O+h\B/?
5W^sr.
E``@<~
k& `s;'
9>61#/Y
)5j#0L
M)66?m5
ZM]r16
nuZ1$MjxXA;:;\
~D"S3j
(lU',iT98WJ
p:.F@{f
Y|bs{Z
DAV;(D
Baf49t
}w$JN,
jtwub0
y]T6~w_
VKro&7
nR6RR<
Juup54
2%' q.CZ
~V&.F$
zt.VN2
EBX=(d
Ehtl65
9p?l9ss|
SZB@^{g
f!jkkp
bHXrey26
@D*1?$
F*`s;Q+F
"e?l8~j$
2>II,Z
$__f7<y
IDZi(ig`
w]5*#A4
=!v0 PV
/_&aOV[
hx]N$e
LAIJ.A
XL\o=4
!U>7l9
Z\FH%%
WxL`~T6=IF>
jl:sk4
<%E+(j
_>7Ho,P
xL6INKG
kP=q}#2B
[*j[3)
)1B^1P
Hh0$!E@
<skmlqX
k.pC+-
T~Jf:8b
:cWH>z
+wUWwuN
8a/+RQ
(i:I:yP
q^xw,h
Js]-_4
\5@~k+a
RFJ-<t
LY0N7&
Kw(_7vJ
%59BvD
\Y^"%T
Y1%!/{
T#+`F(
HoVY6e
'8J\Jd#9
XdSsiv
M@-E"c!
_N3)2]GaH
S&.#Gl
XdX`,P
sR^]cL
(6]LS
u0sOx,
3[e'. eS
8S2V/W\V
Q2XsnHv%
_ZQ"GL=R<
H#X3bS
!G^^^Q
@bCAzNN
5F=VGs3
;Gz=^7H
?Lpu!J
]>b2|L
=rjxuz
0T{s#,
RR^n-c
-cFo%
@*ZPd$
O>,mMur
9a]m-k
dD=u[k+
l3zIymh
|U&M:D
'7M^yi
}G=B52H
y<,4<,
UArTUR
xUL6sO;
O#m@Si
lrAAmF
O/;{8n83`<
j2s-o4
QX{sZ
-&i`XFm
xeLV3V
'S!-@
4sj-?F
JQ`DW]
&CYxxH
V~^*>
$bjc=]
c0|!}n
)> Sj*
tk}%q,
W\Fvvl
77mz>>:z
7%v~9R<A
_PVQy[ss
0SI>$Y
KWPrtP"?
x:%,nE
*DD{
X8L).k&b
EuuuT^
=fO!<(|
0Y$#1r6b
4\iii1
(pTw88
oNgS?)
J11:
'''o9;H
2,#V5((
G?/|**#$fff
62*B**?
)&)v78E
?9,a,,7
4.(,UUU
:3,J666
KH8p///
2.)7L3L
_019
?91X333
QMA}***$33f
51->...
$""h65;
>;4b***
...,HHH
40-I:::
"p217
311l-$-
0&+5TTT
.++W5(5
311|0)0%fff
)%%>33L
%R4-,
1..W333
-%%"<55
2..7>9:
:33J<7;
941b;48
:44~838
yys|HHH
/)#+=68
2((8:45
92.L724
;31g@:=
)))[TU
;5/+c\^
G>>9ogi
NHHQ}sv
~{eUUU
7// yrr
6..!ldi
CCC-vpt
GCC@wpv
IFFZnho
NJLqjeo
444"_Zb
FAA/f`j
A==Fa\g
ICF^gcp
PIPrfcp
:2:#YVa
B=B2cak
@=@Kebm
JGJ`jeq
VRVsmjv
JMPRp{
MOWcit
RT]~do
gag*}y}A
}y?uoh'm[[
}Enic.j__
RRJ]XX4c``Jebbojeg
Kzuu4nff
MMM$a\X7lifRxvqy
}9gg`%ZZZ
__Y(}yp;
?smg*cXX
Fytn.d[[
r}zwQzuu2\TT!OO?
__W |wr1}}zS
\}}}9jjc$TTH
b[['eb^Fojcn
sqnqQnii.QQQ
$$0jb_o
+;LIYdXX]
(E@<GnXVb
KDSe*"*<
&1*7Nb[fz
UNXq'#.G
5;5AZslw
96HU%%*0
bbh][[^
RRUxffi
iil\YZ\
RTVv``c
nnqXXY[
UXZq]^a
nnq\TTW
J\\`|113
4xx~]NNP
<kkn_DFH
gjl```c
NNPe346
mmob//1
>iikh\\^
0xx{YMMQ
mscoree.dll
runtime error
TLOSS error
SING error
DOMAIN error
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
- abort() has been called
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
USER32.DLL
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
((((( H
h(((( H
H
wininet.dll
Failed to download the file!
VS_VERSION_INFO
StringFileInfo
040904b0
CompanyName
New World Interactive LLC
FileDescription
Insurgency
FileVersion
1.0.0.0
InternalName
insurgency.exe
LegalCopyright
Copyright (C) 2017 New World Interactive LLC
OriginalFilename
insurgency.exe
ProductName
Insurgency
ProductVersion
1.0.0.0
VarFileInfo
Translation
Antivirus Signature
Bkav Clean
Lionic Clean
tehtris Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Clean
ALYac Clean
Cylance Clean
Zillya Clean
Sangfor Clean
K7AntiVirus Clean
Alibaba Clean
K7GW Clean
Cybereason Clean
Baidu Clean
VirIT Clean
Paloalto Clean
Symantec Clean
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win64/TrojanDownloader.Agent.AVD
APEX Malicious
Avast Clean
Cynet Clean
Kaspersky Clean
BitDefender Clean
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Clean
Tencent Clean
TACHYON Clean
Sophos Clean
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
McAfeeD Clean
Trapmine Clean
FireEye Clean
Emsisoft Clean
SentinelOne Clean
GData Clean
Jiangmin Clean
Webroot Clean
Varist Clean
Avira Clean
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Sabsik.RD.A!ml
Google Detected
AhnLab-V3 Clean
Acronis Clean
McAfee Clean
MAX Clean
VBA32 Clean
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Clean
Yandex Clean
Ikarus Trojan-Downloader.Win64.Agent
MaxSecure Clean
Fortinet Clean
BitDefenderTheta Clean
AVG Clean
DeepInstinct Clean
CrowdStrike Clean
alibabacloud Clean
No IRMA results available.