Static | ZeroBOX

PE Compile Time

2020-03-22 11:14:54

PDB Path

C:\kegitumo42\xof74\rikoxigecuz51 baxocirewum13_degor21\jiwebik.pdb

PE Imphash

1f1778a50f9b54ca062656e19d05039f

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0001f692 0x0001f800 7.53802193798
.rdata 0x00021000 0x0000410f 0x00004200 4.37379440126
.data 0x00026000 0x01d1d198 0x00002400 2.25620890882
.rsrc 0x01d44000 0x0000f7e0 0x0000f800 6.28068705206

Resources

Name Offset Size Language Sub-language File type
RT_CURSOR 0x01d52a70 0x000000b0 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x01d52a70 0x000000b0 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x01d52a70 0x000000b0 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x01d52a70 0x000000b0 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x01d52a70 0x000000b0 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x01d50b48 0x00000468 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC GLS_BINARY_LSB_FIRST
RT_ICON 0x01d50b48 0x00000468 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC GLS_BINARY_LSB_FIRST
RT_ICON 0x01d50b48 0x00000468 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC GLS_BINARY_LSB_FIRST
RT_ICON 0x01d50b48 0x00000468 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC GLS_BINARY_LSB_FIRST
RT_ICON 0x01d50b48 0x00000468 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC GLS_BINARY_LSB_FIRST
RT_ICON 0x01d50b48 0x00000468 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC GLS_BINARY_LSB_FIRST
RT_ICON 0x01d50b48 0x00000468 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC GLS_BINARY_LSB_FIRST
RT_ICON 0x01d50b48 0x00000468 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC GLS_BINARY_LSB_FIRST
RT_ICON 0x01d50b48 0x00000468 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC GLS_BINARY_LSB_FIRST
RT_ICON 0x01d50b48 0x00000468 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC GLS_BINARY_LSB_FIRST
RT_ICON 0x01d50b48 0x00000468 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC GLS_BINARY_LSB_FIRST
RT_ICON 0x01d50b48 0x00000468 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC GLS_BINARY_LSB_FIRST
RT_ICON 0x01d50b48 0x00000468 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC GLS_BINARY_LSB_FIRST
RT_ICON 0x01d50b48 0x00000468 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC GLS_BINARY_LSB_FIRST
RT_ICON 0x01d50b48 0x00000468 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC GLS_BINARY_LSB_FIRST
RT_STRING 0x01d532a8 0x00000536 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC data
RT_STRING 0x01d532a8 0x00000536 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC data
RT_STRING 0x01d532a8 0x00000536 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC data
RT_ACCELERATOR 0x01d51058 0x00000028 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC data
RT_ACCELERATOR 0x01d51058 0x00000028 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC data
RT_GROUP_CURSOR 0x01d52b20 0x00000022 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x01d52b20 0x00000022 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x01d52b20 0x00000022 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x01d4a788 0x00000068 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC data
RT_GROUP_ICON 0x01d4a788 0x00000068 LANG_UZBEK SUBLANG_UZBEK_CYRILLIC data
RT_VERSION 0x01d52b48 0x000001b4 LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library KERNEL32.dll:
0x421010 GetCurrentProcess
0x421018 GetUserDefaultLCID
0x421020 ReadConsoleW
0x421028 GetLocaleInfoW
0x421030 FindNextVolumeW
0x421034 WriteConsoleW
0x421038 GetModuleFileNameW
0x42103c GetACP
0x421040 VerifyVersionInfoW
0x421044 InterlockedExchange
0x421048 Module32First
0x42104c GetProcAddress
0x421054 PrepareTape
0x421058 ResetEvent
0x42105c GetAtomNameA
0x421060 LocalAlloc
0x421064 SetConsoleTitleW
0x421068 GetModuleHandleA
0x42106c GetCurrentProcessId
0x421070 AddConsoleAliasA
0x421078 GetSystemTime
0x42107c GetProfileSectionW
0x421080 GetLocaleInfoA
0x421088 GetConsoleOutputCP
0x42108c GetCommandLineW
0x421090 HeapAlloc
0x421094 GetCommandLineA
0x421098 GetStartupInfoA
0x42109c TerminateProcess
0x4210a8 IsDebuggerPresent
0x4210ac GetModuleHandleW
0x4210b0 TlsGetValue
0x4210b4 TlsAlloc
0x4210b8 TlsSetValue
0x4210bc TlsFree
0x4210c4 SetLastError
0x4210c8 GetCurrentThreadId
0x4210cc GetLastError
0x4210d8 HeapFree
0x4210dc VirtualFree
0x4210e0 VirtualAlloc
0x4210e4 HeapReAlloc
0x4210e8 HeapCreate
0x4210ec Sleep
0x4210f0 ExitProcess
0x4210f4 WriteFile
0x4210f8 GetStdHandle
0x4210fc GetModuleFileNameA
0x421100 HeapSize
0x421104 RtlUnwind
0x421108 SetHandleCount
0x42110c GetFileType
0x421110 SetFilePointer
0x421114 CloseHandle
0x421120 WideCharToMultiByte
0x42112c GetTickCount
0x421134 GetConsoleCP
0x421138 GetConsoleMode
0x42113c GetCPInfo
0x421140 GetOEMCP
0x421144 IsValidCodePage
0x42114c LoadLibraryA
0x421150 CreateFileA
0x421154 RaiseException
0x421158 SetStdHandle
0x42115c FlushFileBuffers
0x421160 WriteConsoleA
0x421164 MultiByteToWideChar
0x421168 LCMapStringA
0x42116c LCMapStringW
0x421170 GetStringTypeA
0x421174 GetStringTypeW
0x421178 SetEndOfFile
0x42117c GetProcessHeap
0x421180 ReadFile
Library GDI32.dll:
0x421008 GetCharWidthFloatA
Library ADVAPI32.dll:
0x421000 BackupEventLogA

Exports

Ordinal Address Name
1 0x401000 @GetAnotherVice@12
!This program cannot be run in DOS mode.
`.rdata
@.data
jXh0BB
HHtXHHt
>If90t
tehR8@
r= fB
<at9<rt,<wt
URPQQh8Y@
tNIt?It0It
j@j ^V
>=Yt1j
tRHtCHt4Ht%HtFHHt
0A@@Ju
to=HoB
^SSSSS
j"^SSSSS
0SSSSS
0SSSSS
0SSSSS
tGHt.Ht&
^SSSSS
8VVVVV
;t$,v-
UQPXY]Y[
_VVVVV
^WWWWW
t"SS9]
v$;5loB
PPPPPPPP
PPPPPPPP
0SSSSS
_VVVVV
t+WWVPV
<+t(<-t$:
+t HHt
u;hd&B
u,h\&B
= '+ZH
Nof|q=
ey~hVQ
A:ICH:i
b|8/J4
N4;f*<
B.DF8EFtL
YzxFf
LFs[DOoAS~
f1 o(`B
]^aRj;
,AIjs!
fhB}13
kf[)-2@Fr
+9_8JF7
?SE#$
5?1bd
cL2A>mCT
+]>]WX
`Io%H
'.*KCO
*aL#?X
FCTWI\
sx*;e8
g=DZ}.
P>u[g|p
Cu!m5:
W=3;H9Ra
U;tDP'Xx
AC(~T~
=RL&4Xj
4H1N>x
8&XQS(T
^2P9rr
7qn|-8bn
XnSmfM
(t=OtNZR
]d`slW}
ck.nCsO
BQgzc#&
HH5`j>{+
0.+4Kw
ikGTBI
hbWr~B_
W3<9yih
$"`Yy%
t09b5ke
qbxBT=
d>}%B}
b7KVKQ
+{}Hm$4
3yJtKv
LV%/=q
"e"4Md@3
9k~;?
)R lBn
5o8C^Ds
\1?\tCvw
3JD5iupJ
W|r]v<
YiVj[M%P,
+82N/z6
(5!7Q$
rkZr@i
Jh5RQ!'e
JPWLp6>
Pz?t4)
8Ek"\f
!N@^x>`
kWvQ+e
Zx!.q7
DgpF!)
t.3#CLbB
M]gL+^4
rNPS<K
dvyIM~
3~E=CQ
9:domJr(
B&Cy5i
yC.`dG
!K #u{
uKM~hhVU
O7:jqchp
.%4>$n
N6Wtar7
J}~nEb
n#*#Gd
wmR3o[
5*$cmP
|>+Vn\8
>(=b127\
H2A^qw
RCUVX%01
-K93UB
|.fp!G
6}!na>
-v:467
49G4ld&
83b[|<)
~_GtjuAk
QQSVWd
HtHu4j
s[S;7|G;w
tR99u2
(null)
`h````
xpxxxx
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
CorExitProcess
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
UTF-16LE
UNICODE
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
`h`hhh
xppwpp
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
_nextafter
_hypot
GAIsProcessorFeaturePresent
KERNEL32
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
CONOUT$
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
1#QNAN
1#SNAN
bad allocation
kernel32.dll
LocalAlloc
VirtualProtect
bad allocation
bad exception
Unknown exception
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
C:\kegitumo42\xof74\rikoxigecuz51 baxocirewum13_degor21\jiwebik.pdb
GetCommandLineW
GetLocaleInfoA
FindActCtxSectionGuid
GetCurrentProcess
GetSystemWindowsDirectoryW
GetUserDefaultLCID
GetSystemDefaultLCID
ReadConsoleW
GetEnvironmentStrings
GetLocaleInfoW
LeaveCriticalSection
FindNextVolumeW
WriteConsoleW
GetModuleFileNameW
GetACP
GetConsoleOutputCP
VerifyVersionInfoW
InterlockedExchange
Module32First
GetProcAddress
EnterCriticalSection
PrepareTape
ResetEvent
GetAtomNameA
LocalAlloc
SetConsoleTitleW
GetModuleHandleA
GetCurrentProcessId
AddConsoleAliasA
FindActCtxSectionStringW
GetSystemTime
GetProfileSectionW
KERNEL32.dll
GetCharWidthFloatA
GDI32.dll
BackupEventLogA
ADVAPI32.dll
HeapAlloc
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
DeleteCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
HeapSize
RtlUnwind
SetHandleCount
GetFileType
SetFilePointer
CloseHandle
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
LoadLibraryA
CreateFileA
RaiseException
SetStdHandle
FlushFileBuffers
WriteConsoleA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetEndOfFile
GetProcessHeap
ReadFile
lokin.exe
@GetAnotherVice@12
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVbad_exception@std@@
.?AVexception@std@@
.?AVtype_info@@
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXX
JXXXXXXXXX2e
XXXXXXXXXXXXXX
XXXX2e.
XXXXXXXXXXXXXV
oXXXXXXXXXX
XXXXXXXXX
oXXXXXX
oXXXXXX
goXXXXXX
XXXXXXX
gXXXXXXX
CeXXXXXXX
XXXXXXX
XXXXXXX
LXXXXXXXXXV
XXXXXXXXX
XXXXXXXXXX
4/`?`>-
XXXXXXXXXXXXX
XXXXXXXXXXXXXX
XXXXXXXXXXXXXXX
uYJXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXLg
e=XXXXXXXXXXXXXXXXXJ
XXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXX<e.
XXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXX~g
XXXXXXXXXXXXXXXXXXXXXo
XXXXXXXXXXXXXXXXXXXXXo
XXXXXXXXXXXXXXXXXXXXXoLp
oXXXXXXXXXXXXXXXXXXXXXoK
XXXXXXXXXXXXXXXXXXXXXX
oXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXJ
XXXXXXXXXXXXXXXXXXXXXXXXXXX
]JXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXi
L8oXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXi
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXX
y&XXXXXXX
XXXXXXXXXXX9
XXXXXXXXX
XXXXXXXX
UXXXXXXX
XXXXXXX
XXXXXXX
XXXXXXX
9XXXXXXXX
*XXXXXXXXX"8
XXXXXXXXXX&86
XXXXXXXXXXXX
gXXXXXXXXXXXXXXU
LXXXXXXXXXXXXXXQ
P6XXXXXXXXXXXXXX
'UXXXXXXXXXXXXXXXX
^XXXXXXXXXXXXXXXXX
6XXXXXXXXXXXXXXXXXi
2XXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXX
xXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXL 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
0000000000000000000000000000000000000000000000000eg6
:s00000Q
qS000000
C?0000000F|
J0000000/Ui
00000000I@
0000000000
00000000
g~l'B`C
qNVx9A\
"CbtT6
(c~~N>
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>M
M>>>>>>
TTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTT
>>>>>>
>>>>>>
>>>>>>
}}}}}}}}d}dddddd(d(d(d(d(d(
>>>>>>
}}}}}}d}}}dddddddddddddd
>>>>>>
}}}}}}}}}}}d}}d
ddddddddd
>>>>>>
}}}}}}d}}d
dddddddd
>>>>>>
}}}}}}}}}d}}d
ddddddd
>>>>>>
}}}}}}}d}
dddddd
>>>>>>
}}}}}}}}}}d}
dddddd
>>>>>>
}}}}}}}}
>>>>>>
}}}}}}}}}}
>>>>>>
}}}}}}
>>>>>>
L}}}}}}}
>>>>>>
L}}}}}}}
>>>>>>
>>>>>>
>>>>>>
}}}}}}
>>>>>>
>>>>>>
>>>>>>
}}}}}}
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
GGGGWWW
[PPP
>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
MMMMMMMMMMMMMMMMMMMMMMMMM
A8$)7x
~~~~~~~~~~~~~~~~~~
~mmmmmm
::::::::::::::1
AAAAAAAAAAAA
SS}}}}}}}}}
SS}}}}}}}}}}}
SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS
2\~t,f
)HTld7_
';B[E'Z~
iiiiii
iiiiii
iiiiiiiiiiii
iiiiiiiiii
iiiiii
iiiiiiiii
iiiiiiiiiiiii
iiiiiiii

(null)
KERNEL32.DLL
mscoree.dll
((((( H
h(((( H
H
wesepegagitazayagasanahobepomif
satavopofomedudoxe wozewukuzedicobir gav guf vanarizijavegagerusuxo
yenaxivaxecesolajizefiyutov
mumefere pavegurovi
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
VS_VERSION_INFO
StringFileInform
020264c6
InternalName
sojbmoemonu.uhe
Copyright
Copyrighz (C) 2021, fudkagata
ProductVersion
8.19.590.38
VarFileInfo
Translation
SNehonelelaru bilikugotav luxuvacokedux yiruh sixuxoyulapaf mosinis hige mudeyuhokid
WogipetuhevuLWehi jev nefenapi koze cejeze mijarupad sewomedamegebay legesuhuweni tagexerdHoyipewamazi sab dohubiwiv tegoronizise lev nesomogiwajace bizi newazapabarivud rifulafivovoji dotosdXupivixejuhuw lorojixi hedaj vawohihonakopal mutoy hatozitawore tajajo wedepapepivuziz ruxunalukituj
Cezuzikixeya
@Bamiwu romoho tihanesuno jenegija rojaseyubeceso pusace roboyaye$Vagunuyivayi bobimeh gewuhu kuhusodi
Gaw puw
Xuhahopecox tezumeguzotisidgCowaceyajut tayekasobeh jisezapumefom bagekuhekewok pabavof xavoho kumigep kenawuyud janoxivuhiju heruh
Xakexufix:Gahiw bijohidinoheyo ciyovoxojaned xec peh niketec xabucin
SWini fiboduwa puzasepirunal lafobesafoy yoyehodukex nuyeha tahudulifito tufobudoxohBYena hijuwumaden nihoxirucesix femi tikucigehedebuk nivulay vigegi_Winijijovipo cez sokituheki yagokokefojibeg wihukil xigagu xovivaveho yiwiwelen civigucoviteruc
Fad0Sunapecanuc zoviyinupup gadevomi gumuzodubuvajoh
Sarimeta
Liropogodud
0Dunud gujen nurejopumevipi xow ganuzu hevoxijepo,Subizucatal cola yupufemu xuhate joyi wekuyo"Bumutunawafi toteyu muborezasefotaZGuwiwofewi hivixecile xojujicibululav cezub lopidekuduve pizekul dicemaxoj sevadowukomokagTGarirozusa diwuxirozuwaho lafuyavodoroz nodigevi yubu fuxegajevicoh ten kusiyeb hobo%Bulaluzab zakukajiyiloc fusokoxudukiz
Antivirus Signature
Bkav W32.AIDetect.malware1
Lionic Trojan.Multi.Generic.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.46965167
FireEye Generic.mg.be72c9c102de48a6
CAT-QuickHeal Clean
ALYac Trojan.GenericKD.46965167
Cylance Unsafe
VIPRE Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 0058244a1 )
BitDefender Trojan.GenericKD.46965167
K7GW Trojan ( 0058244a1 )
Cybereason malicious.9ce93a
Baidu Clean
Cyren W32/Kryptik.EWJ.gen!Eldorado
ESET-NOD32 a variant of Win32/Kryptik.HMLI
APEX Malicious
Paloalto generic.ml
ClamAV Win.Packed.Generic-9892828-0
Kaspersky HEUR:Backdoor.Win32.Androm.gen
Alibaba Backdoor:Win32/Glupteba.ad8aaeab
NANO-Antivirus Clean
ViRobot Clean
Rising Trojan.Kryptik!1.D977 (CLASSIC)
Ad-Aware Trojan.GenericKD.46965167
Emsisoft Trojan.Agent (A)
Comodo Clean
F-Secure Clean
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Emotet.dc
CMC Clean
Sophos Mal/Generic-R + Troj/Krypt-BO
SentinelOne Static AI - Malicious PE
GData Win32.Trojan.Agent.LWDS3H
Jiangmin Backdoor.Androm.bbqu
Webroot W32.Trojan.Gen
Avira Clean
MAX malware (ai score=80)
Antiy-AVL Clean
Gridinsoft Ransom.Win32.STOP.ko!se25773
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Glupteba.SM!MTB
Cynet Malicious (score: 100)
AhnLab-V3 CoinMiner/Win.Glupteba.R441292
Acronis suspicious
McAfee Packed-GDV!BE72C9C102DE
TACHYON Clean
VBA32 Trojan.Sabsik.FL
Malwarebytes Trojan.MalPack.GS
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
Ikarus Trojan.Win32.Crypt
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/GenericKDZ.D992!tr
BitDefenderTheta Gen:NN.ZexaF.34142.nq0@aOimXxjG
AVG Win32:CrypterX-gen [Trj]
Avast Win32:CrypterX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.