Static | ZeroBOX

PE Compile Time

2021-10-14 11:57:43

PDB Path

C:\Users\VICTOR\Documents\CryptoObfuscator_Output\cryptedd.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0003b2a4 0x0003b400 7.96109516166
.reloc 0x0003e000 0x0000000c 0x00000200 0.101910425663
.rsrc 0x00040000 0x0000e594 0x0000e600 7.27500718297

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x00043db8 0x0000a291 LANG_NEUTRAL SUBLANG_NEUTRAL PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
RT_ICON 0x00043db8 0x0000a291 LANG_NEUTRAL SUBLANG_NEUTRAL PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
RT_ICON 0x00043db8 0x0000a291 LANG_NEUTRAL SUBLANG_NEUTRAL PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
RT_ICON 0x00043db8 0x0000a291 LANG_NEUTRAL SUBLANG_NEUTRAL PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
RT_GROUP_ICON 0x0004e04c 0x0000003e LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x0004e08c 0x0000031c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0004e3a8 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.reloc
B.rsrc
%&k(A
%&$(:
%&<(:
%&@(:
%&D(:
%&X(:
%&\(:
%&x(:
%&n.!
<H4py
-<5#Cr
m`k%2*c_
[1kl]A
*(81Z@
F=G_4^b
y6FUSr
LDq2u2
)gtC(X
i<M7 u(=E
EYf%P=>{
-p/]@^D"
|R4$*S
*gd^!m
\_LrI?B
@vJ NNk)
(DsY8p
WUM@ZX
bB ^-BD
T1U@U;
N7IS6Dc
oE;f}.
duvn@RhKH
h4,=(h?
ONVl)=
Mqz9aI
u@)'}x_
-\,lMp
Dq\20(
OJ(.?[
+]8m0^
xIcX>^s
6%s,/F
\xub,?
BRXE^N
{'&_QN
W7ZSs@
#xO?If
/LXA+N
a<Yahw
gPqO{{dH
E_"(5.
oE2We
,bN<(v
1PIUWPU
YG7!$}a
,t?*d)
+ur2S@*
_'{pP
TB:|DJ
>h+v7Z$
&;h|nd
(^uYxb
Jl\vz_
mbV<4|
9r/6$o
PZQ8*6x
'`&pXf
|LQ5ye
>xxyh[\
7De.i
Jo}<^!"
!bONq?
?+yAQh
yxDd?M
r[R/^SD`;
UQkhf=
,:KBbB
4,!rV
aF\Cx@
~Sx*Z7
dmv*2y
adAW,Cx
wN\d^KXu
B&[{"WF
.&>LT?
SU^<7z
8*Arkq
lEO*I,
+[1`#U
0_?(^(
{.V.M^o
}w!geMm,y
[r9jvL
ZxhTk
;9t6].,
r~**yz
4WW(7.KC
i-V`s}(\
YfF{BS
kpdz]_F
v8i,hy
mq#rc_
06r$J
s^_mT`
3Gzz5$
7AjJ{x
>Rdl9U
an.u&Sgg(
f.+cOXH
k,Cu k
#l>$FY
6[E&!+
i'u-/2
,)#@)^
{B$c7K
FA"aS,
ho!bP2
]]Y/km,k
=F#?a#
"`p.>)
ydtji-u
abBTI<
iX8=Rk
_AEF<W
&fvU-Sh
8`Z(ur?
kc,a5s|D
P|_OjWw`pl
#?F0\o
1;!68D
p6}>1t}
WdN<u
#nF@J
$qf"U4
k7T,K=
4tlbg\
]A=Ca,cJ&,
udl^:SR$
~X1.OFR`
rp>m~K
&`VA-/
;M_f-E
I2OP`'1
=RVi9+
O+#R,A
tJ6FDV}!
.a=+=3
TGAN/1
xJg}yyt
VBW#zL?
o[Z;4C
l#yB"<
J.TLag
'TW8zF#
bK!@fp
uGI'jx
2[8c%L
G tx%?
/\`>.bL%
W4[@sIT
#:^Jkup
LHxm@V]
}(^ =d
;oJ-F|
fK!/sDs
}Y;c?B
&R%e0Y
"$-PXh
[D#G+c
f7D)3bV9
]:QM[O
R`?.wn
lU"WC.
/t<]iK
N*6e$DS
yqH2:.
l@bs.F\8Wxw
/+~'g#%u
o\I=D
Wsig4N
K@<7wU&
':%"#l
]Y.@^/t
=J,$g
z_=(V;
L;kzhr2~
G|Xby&
v<VCbsS
ew0S2L
(AUOqu
%l&4h(
Xj {gLQ|
DJLil(
;plb0q
2x18l
),{1#~P
D>3HkIR
,AacXd[
pZY8iBLf9
/Lv;HS
as[%i}
?%%DR/
5a?^#8
{J8Ygp
;ouZp, G
vdlfDX
mwdz:yCS
rHf1EuZ(
|@GEuc
r]h#`r
`3|y\a
U{f0Zn5
&d.l9%1
8)mw*v
QlM.1?Og
IXi$M/i
<i;y,j
:ZR}]<
8_\@dx
QjJ{I"9
mr(Q7n
HS7C*'[
'w]co,
{`KdD2F
S}r/gx
_#)$[:>+r
"PTRCM
UOvhHK
eeNR8\
uGWHS
/Uap>4
X>/sgg
UVB`Il
45k}`7lO
NBNUtP
DmkD@5
HStS"+
wPhW-e
CK(Rk2
VU>uzeT~W
8vJpiB
wfG@'
XF:],L
F$psFmPx
D~L#F*
,>3:(l
K-us@c66
jjU{89
Sv~/
iHL7\Eo
>*#~~L
p=V@\#
5`s;J[
J2ZIF
KG}0;S
ULSazy
?,&D<_>
O+T"mp
["I+PI
&MUHQg
Xu_A\Mf]
`j3AE!w
Kxd1MI
/Q^]HP
I>rXh4
7:VCzfe
Q^0bMot
N&i~8h
MUP.@l^w
g%xR'S
2<.qGkmf
&|wEO>K<{
~rTKx3
(/?PQP9Yg
4Plhcbk
XwY75e2
|C} V];
pD:#_j+
2Jtc'$
>DNt?F
s4$7rjT
~s#L8S@
(]~Wr%-8o]}n
@HI8A!
`FEY>D
!!R/"J
j]v@=0
8K/Hg|
tm`|ar
M>HJ~5U/
TPoMZq
@UTQE9x
0pr,,k
7[ vH6
/#e&TQ
;]kj m
7 h>S(
T&+M#c
=3V`1
i+|x;Xj
xUY/&k
a)e0;
L$A9Zp
XGqukf
xhYYr8
v^C3+
T[M5}"Y
")zw=xE
BSqM+=
3O|j9p
Lrbb1\
_D99<x
Jh.2TJ
Xd6Kt=
}ym4zA
"M6YWn
=<F>@
VaEo/h
! pB]Y
shiNMD0
I$n.0DK
HP|'Q&$vR
ah5MES
E@CPeG
s3/ie&}T
'd7*l7
r|2Go.
KP?/*y&
m*Iq^8?
{VGWwRY
*^rYSb
jJ/UKt!7C
3iS@hg
zx|].B*
9!zG=v
Y">FX;x6
=rl>?E
?L5x[_5
4~v,a$*a_
Yb3DB+V
@_{S-_
QfKv6^
T2|74|Y
o(crOb
Ho1tSn
q\7a1W
&LRSk?>
h(oA?T
;(;uy9
u,3R3\
-AG%Jqb
u#MqF5
O%-M<C
/A7gY?
E67glb
2mBW93?
!Wc'!F%b
W[Z&w
R^'_ G
`*}BN7
UiE,y<
w^lBc04
Fc<c
Jd!3#"
[Z=;d8
DH@(VP
sMJuS9
mvSu*W
K5D>ly
;zzpQm
g, @)@
5Ga%i<{
>!wUxP
#Pi]m?
IDyymQ
2O}JppH6X
RSDS7D
C:\Users\VICTOR\Documents\CryptoObfuscator_Output\cryptedd.pdb
v4.0.30319
#Strings
cryptedd
cryptedd.exe
mscorlib
System.Windows.Forms
System
Microsoft.VisualBasic
System.Drawing
kernel32
cryptedd&&
Strings
Registry
Microsoft.Win32
RegistryKey
AppDomain
AsyncCallback
Attribute
BitConverter
Boolean
Buffer
GeneratedCodeAttribute
System.CodeDom.Compiler
EditorBrowsableAttribute
System.ComponentModel
EditorBrowsableState
IContainer
ApplicationSettingsBase
System.Configuration
SettingsBase
Convert
Delegate
DebuggableAttribute
System.Diagnostics
DebuggingModes
DebuggerNonUserCodeAttribute
Process
Double
Exception
CultureInfo
System.Globalization
NumberStyles
IAsyncResult
IDisposable
IntPtr
CompressionMode
System.IO.Compression
DeflateStream
MemoryStream
System.IO
Stream
MulticastDelegate
Object
Assembly
System.Reflection
AssemblyCompanyAttribute
AssemblyConfigurationAttribute
AssemblyCopyrightAttribute
AssemblyDescriptionAttribute
AssemblyFileVersionAttribute
AssemblyProductAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
ResolveEventArgs
ResolveEventHandler
ResourceManager
System.Resources
CompilationRelaxationsAttribute
System.Runtime.CompilerServices
CompilerGeneratedAttribute
RuntimeCompatibilityAttribute
ComVisibleAttribute
System.Runtime.InteropServices
GuidAttribute
Marshal
RuntimeEnvironment
TargetFrameworkAttribute
System.Runtime.Versioning
RuntimeTypeHandle
DESCryptoServiceProvider
System.Security.Cryptography
ICryptoTransform
SymmetricAlgorithm
Single
String
Encoding
System.Text
Monitor
System.Threading
Thread
UInt16
UInt32
UIntPtr
ValueType
Application
AutoScaleMode
ContainerControl
Control
FormBorderStyle
<Module>
cryptted
cryppted
AssemblyInfoAttribute
c6bc50d6fdf2a635adc07d71c2d60d457
cf50b601a31e7bd4ffae24f6fd5ae3fee
Settings
cryptedd.Properties
ce231dc5f4ba84def60851e8d96c98a81
c05b1b10be223963960ff1f8f0cbcabe3
c055767429aa70b6ffa8a834e07039cb7
c6c3f4022d76a5cd83b7ece593d30798d
c23943ce130e667e97bb16b1cb64c0e01
c8fad7816e22df48daf87135f495bd505
c36d4dce148a3156ba5210cd65b8040c4
c54ac32bbcfb01deeae6e5d46e063e7f3
ccb8dce62983db8c9f1d13cbf55929d0a
c719d231d227582a6ddfc0da7932bf9e7
cdc57359b5c43f0eb540534cd5dad2f7e
c2d5084b2de748e1c97595be58241e703
caee59f7c48b52ea314c6a2d7d5251b37
ce9cb8a3892554fbf97b5bde70296a832
c537af506a33ca7a75f180bc455b6a8de
c0ca534898647b46dda8ebab53f17060b
c33ad6f86918efaa63d443f94fdbf68eb
c678174c463d3a98db5cb0376ef37fc46
c709fe8ca651343170f32b04175fabd94
c8116546da2374945d82c08ccc5c1eed3
c89097bb032687e89738c54c36b8c75bd
c9d6165a4c55fcbe19d71998a3ef62fb3
cb249ccbe30217e699788623ea2847b13
cc6e32c220068f75a0eb551e20ae4a305
cd59761e546d639f9961e449c70948723
cdf191b6bc04655f1330635319063d9da
cf27b9d736c1a16213c9fd3dba8511726
cf634fec40d90e4f59481c922e525d455
.cctor
cd3bf35f599c53e9f03df03dadf87c2b6
c594e3291b18bbd60cb3ee14e22bcd720
c019eeefc05adc661b53893702afbcfbc
c7ae8162a8f7e50dd5ea053c688c04690
cc88b4ac63689e1d0b1803ed9fc456a4f
c9b921506792c569a34bedb1a4125cd47
cb982bc1dc282145028b1d400e02e229e
c1af1c169ffd818b34137fe137e6863c6
cdb4c3b75d15f87b594f98720fe9dee88
cfd16bb010c3fb3b764d81b1b3159b240
ccc57ce95ea0ad7f3158cf695dd3efd4d
c983477cf7c46db6b45b36ae063e7d8e9
cd7f78e26821bc1650b0e6c6e54925558
cdda9d541bda7f4e0f29cbbd0f10f16ad
cfce6cd34c483afc692a675ae1349f7ea
c4893a5cf392500eadcadd1563ffd55ee
cd5eeb131a33a1d6964c71a0673f82e2c
ce0000110e06f6f905dc0fb88b607c7a4
Dispose
disposing
c8eba85878ad30a7b3455e44a5a6cdb20
c8f4e79081f49ac9007504f7b80f11e9e
cedff0ff410076bf4591d044b48180507
get_ResourceManager
get_Culture
set_Culture
c4f0fc193216b595f10ea130d60b42af2
cde0eb1784406730fb86abb770c805639
c3dac3bc9c402c630ae34478e79364bf8
ceb09f2b350c5da62b7a44029675ae46f
cf0654eaa03c9d48c92eb9ca506f88e78
c1de0860a4cd815256ffd978458d57fde
cfdf2bc625385420d6461d612d413f68c
c040c7681f57567874af655d074bc44d8
defaultInstance
get_Default
object
method
Invoke
handle
BeginInvoke
callback
EndInvoke
result
thread
context
address
length
protect
process
baseAddress
buffer
bufferSize
bytesWritten
bytesRead
c3463f36827155459aa0c4ab9510d443f
cf362449de1c9aeadaaa92249a99608fe
c37326bccc180f485fc2d348b1dd01eda
c524c924edae8fce110e97dfc0753ea2b
cb3498f76babf366b50e172d9bb084c59
c586970c7ce3c7680441b9e62dfd125b2
c6ccc065c6dbdc444899139c90500ae90
c060f6b22f4a7e647194d920c4ccbc28a
c69c076c20f9f6a435dfabc777449879e
cb5de59200a8e15ccf54827dbff0f2772
c40cace07e22d660b6a65295219821e11
applicationName
commandLine
processAttributes
threadAttributes
inheritHandles
creationFlags
environment
currentDirectory
startupInfo
processInformation
c11970ccb523ce7b1af57392dd49c69c3
ce8bbc85c34e8078fa6dffb601cbcaab1
ce982b1c98a82211e6d2ae85054243475
cc97fa615318c54c0a0b0edfafbfe3e27
cf84332fd4c79d2d24b10a1a6ef3d5f88
caa4bb6f40a0f6f0da17b7f77660ef872
c402350812767a1e513ae81c2fceb406d
c2ade0d7fa2791a7d6ebf2197ca24e896
c7e57eed864bc209ee4ae8c7dd99461e2
c9a8255d7937d25ea0da911c95f1c47b1
ce27572dfb9ffca85ba72b54a3f489b4f
ca6f9e75469214c20193e9fe00dfa027e
cef4b330bc9dcb6f3bda7deee6debdc37
c852145985d378d51209ffdd0d0ed9244
c1804b444f9e3278fef82cc21d76fe479
c2c9ac97a5ba00f9845831dda47bdade1
c0c085cf38f3f42b3b63e97ef4e804d87
cc4cc75e7f01d2fe4b5e74beb2b8794a4
c69c5c3dc4f32efd6f2026619f19c0cef
c76aa3a39e713d1e5e4e8ab2cdd259bcc
c03ec1b7fe52130a15d526928d460b69b
c771c50d753a1bd9368b17002a829978d
ccaca9a0a8eed4af3511ad76f4bc82610
c9a3438997085d967ec271c502ad1af89
c777e64a4f269878d47e49bfc2dfdd3c9
cbf0e3b30c1d32a50198d90b684c41289
cd04332ebd12542a1313f87d12ad77b66
c0bc6367fb5a4eca4124f40e05eec1683
c14b79e13e24da6d0c477a4d6913e9561
ce7ef1fa7809e4a236afa46dab6604313
c00aa55cd5e2f50797a06072d7f0bcd9f
c9961ada1f89bbfc765466341cf3ae710
c42661a69ad1dda5cf09868dae138e43a
LoadLibraryA
GetProcAddress
Culture
Default
cb71f82c847322a484b4b3327c20decb7
GetTypeFromHandle
GetDelegateForFunctionPointer
CurrentUser
OpenSubKey
get_ExecutablePath
SetValue
DeleteValue
GetRuntimeDirectory
Combine
StrReverse
FromBase64String
SizeOf
ToUInt32
ToInt32
get_Size
ToInt16
BlockCopy
GetBytes
GetProcessById
SuspendLayout
set_AutoScaleDimensions
set_AutoScaleMode
set_ClientSize
set_FormBorderStyle
set_Name
set_ShowIcon
set_ShowInTaskbar
set_Text
ResumeLayout
get_Assembly
get_CurrentDomain
add_ResourceResolve
add_AssemblyResolve
GetExecutingAssembly
get_Name
StartsWith
GetManifestResourceStream
get_FullName
IndexOf
Substring
GetManifestResourceNames
Synchronized
get_UTF8
GetString
ToInt64
ToSingle
ToDouble
get_Unicode
Intern
get_Chars
Reverse
ReadByte
set_IV
set_Key
get_Length
set_Capacity
set_Position
CreateDecryptor
get_InputBlockSize
get_OutputBlockSize
get_Position
TransformBlock
TransformFinalBlock
ToArray
op_Equality
Concat
3System.Resources.Tools.StronglyTypedResourceBuilder
4.0.0.0
KMicrosoft.VisualStudio.Editors.SettingsDesigner.SettingsSingleFileGenerator
11.0.0.0
WrapNonExceptionThrows
cryptedd
Copyright
2021
$342beda8-405d-41b1-ae80-1d85ffa08933
1.0.0.0
.NETFramework,Version=v4.0
FrameworkDisplayName
.NET Framework 4
_CorExeMain
mscoree.dll
&IDATx^
7;nI>{
=vjse:
yZ=yf#
KxCP|Cp
0L"p)?K
"0OG@o
0S?]O}H?
q`P|Cq
X!hL!Xe6
CzBK`
!>1?_%@
0O=vd."@
!<1%-H`
!>cM~K
opE`iP|
w:6Bu>6
0D`("0
dO~K~/
@X~Ci#@
' >G Z
_|C@|f"
=R|"(>
-~I" ?
>)XA#@\J
B[@'[XKj
h@h"B~"(
){4 zi#@8"@
t<xb="@1
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
xCNKlR
a^ Y U
>l]>}4
"5-ilg
h1o-QdU\
u1"B4PY
=tNU?
G.i%4.8
r+7*P
(4#3-
lQGszr`3
yE1hbg
Hb~Qgr}
_[Y'k,X^s=
3,cA,K
s\R9}#
*7cI%7
wQ>bk(
h@R+w~
oi0#LM
-En<?]6
d)J-Gz
_'dfeoi
wjgP|3
Y9:(:%
=^Oh#_
(?k^kS$
7FdTBw
]xtf;w@
ljbjNw
?93;F/
'j.X"=A
`! b?v~/K
RsnPT`L
>B&tZsj
zDa@Sv
p]h&"!
>^(dtI
^UO0o_@
6\DsH4
_)7{2u
3jneB_xi
eH4@S%
.lpl#Yqs
T{= f
T{= f
T{= f
T{= f
T{= f
T{= f
T{= f
T{= f
T{= f
T{= f
:p_ &h
P(,q ee
BJ`Fdk
nz$5Un&X
(mU0]
Washington1
Redmond1
Microsoft Corporation1.0,
%Microsoft Windows Production PCA 20110
201215212914Z
211202212914Z0p1
Washington1
Redmond1
Microsoft Corporation1
Microsoft Windows0
I0G1-0+
$Microsoft Ireland Operations Limited1
229879+4633440
Chttp://www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl0a
Ehttp://www.microsoft.com/pkiops/certs/MicWinProPCA2011_2011-10-19.crt0
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
111019184142Z
261019185142Z0
Washington1
Redmond1
Microsoft Corporation1.0,
%Microsoft Windows Production PCA 20110
i%(\6
Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
Washington1
Redmond1
Microsoft Corporation1.0,
%Microsoft Windows Production PCA 2011
,u1qEorzUH3qGrrPZjgl6H99WweaBuGeX6mk5Lft0iUg=0Z
http://www.microsoft.com/windows0
rfC-UQ
20210826100926.992Z0
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1&0$
Thales TSS ESN:E5A6-E27C-592E1%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
201112182555Z
220211182555Z0
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1&0$
Thales TSS ESN:E5A6-E27C-592E1%0#
Microsoft Time-Stamp Service0
Ehttp://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl0Z
>http://www.microsoft.com/pki/certs/MicTimStaPCA_2010-07-01.crt0
T#.d.A
Yo<)QE
Ln>+0f
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
100701213655Z
250701214655Z0|1
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
$`2X`F
Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
1http://www.microsoft.com/PKI/docs/CPS/default.htm0@
oK0D$"<
r~akow
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1&0$
Thales TSS ESN:E5A6-E27C-592E1%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
20210826135511Z
20210827135511Z0w0=
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
d~X|b
Dummy0
130101070000Z
130102070000Z0
Dummy0
__MOZCUSTOM__:campaign%3D%2528not%2Bset%2529%26content%3D%2528not%2Bset%2529%26medium%3Dreferral%26source%3Dsupport.google.com
DigiCert Inc1
www.digicert.com1$0"
DigiCert Assured ID Root CA0
061110000000Z
311110000000Z0e1
DigiCert Inc1
www.digicert.com1$0"
DigiCert Assured ID Root CA0
DigiCert Inc1
www.digicert.com1$0"
DigiCert Assured ID Root CA0
131022120000Z
281022120000Z0r1
DigiCert Inc1
www.digicert.com110/
(DigiCert SHA2 Assured ID Code Signing CA0
p1f3q>
http://ocsp.digicert.com0C
7http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
4http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
4http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
https://www.digicert.com/CPS0
DigiCert Inc1
www.digicert.com110/
(DigiCert SHA2 Assured ID Code Signing CA0
170623000000Z
190628120000Z0v1
California1
Mountain View1
Mozilla Corporation1
Mozilla Corporation0
/http://crl3.digicert.com/sha2-assured-cs-g1.crl05
/http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
https://www.digicert.com/CPS0
http://ocsp.digicert.com0N
Bhttp://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Symantec Corporation100.
'Symantec Time Stamping Services CA - G20
121018000000Z
201229235959Z0b1
Symantec Corporation1402
+Symantec Time Stamping Services Signer - G40
http://ts-ocsp.ws.symantec.com07
+http://ts-aia.ws.symantec.com/tss-ca-g2.cer0<
+http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
TimeStamp-2048-20
Western Cape1
Durbanville1
Thawte1
Thawte Certification10
Thawte Timestamping CA0
121221000000Z
201230235959Z0^1
Symantec Corporation100.
'Symantec Time Stamping Services CA - G20
http://ocsp.thawte.com0
.http://crl.thawte.com/ThawteTimestampingCA.crl0
TimeStamp-2048-10
DigiCert Inc1
www.digicert.com110/
(DigiCert SHA2 Assured ID Code Signing CA
180920151138Z0
http://www.mozilla.com0
Symantec Corporation100.
'Symantec Time Stamping Services CA - G2
180920151138Z0#
"3D9B94A98B-76A8-4810-B1A0-4BE7C4F9C98DA2#
Y3J5cHRlZGQl
Y3J5cHRlZGQk
PublicKeyToken=
publickeytoken=
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
cryptedd
FileVersion
1.0.0.0
InternalName
cryptedd.exe
LegalCopyright
Copyright
2021
LegalTrademarks
OriginalFilename
cryptedd.exe
ProductName
cryptedd
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
"Microsoft Window
Legal_Policy_Statement
<<<Obsolete>>
Antivirus Signature
Bkav Clean
Lionic Trojan.MSIL.NanoBot.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Clean
FireEye Generic.mg.d100485ad14f8463
CAT-QuickHeal Clean
ALYac Clean
Cylance Unsafe
VIPRE Clean
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
CrowdStrike win/malicious_confidence_100% (W)
BitDefenderTheta Gen:NN.ZemsilF.34218.wm3@au672Bf
Cyren W32/MSIL_Kryptik.ECW.gen!Eldorado
ESET-NOD32 a variant of MSIL/Kryptik.VDE
Baidu Clean
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky UDS:Trojan.MSIL.NanoBot.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Tencent Clean
Ad-Aware Clean
Emsisoft Clean
Comodo Clean
F-Secure Trojan.TR/Dropper.Gen
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition Artemis!Trojan
CMC Clean
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
GData MSIL.Backdoor.Nancat.6P33LK
Jiangmin Clean
MaxSecure Trojan.Malware.300983.susgen
Avira TR/Dropper.Gen
MAX Clean
Antiy-AVL Clean
Kingsoft Win32.Troj.Undef.(kcloud)
Gridinsoft Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
Microsoft Trojan:Win32/Woreflint.A!cl
Cynet Malicious (score: 99)
AhnLab-V3 Clean
Acronis Clean
McAfee RDN/Generic.dx
TACHYON Clean
VBA32 Clean
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Clean
Yandex Clean
Ikarus Win32.Outbreak
eGambit PE.Heur.InvalidSig
Fortinet MSIL/Kryptik.VDE!tr
Webroot Clean
AVG FileRepMalware
Avast FileRepMalware
No IRMA results available.