Static | ZeroBOX

PE Compile Time

2022-12-07 16:42:31

PE Imphash

bef982b9edad5be092321ba1afb3822f

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000d80c 0x0000da00 6.59860600891
.rdata 0x0000f000 0x00006244 0x00006400 4.86639295622
.data 0x00016000 0x00001808 0x00000a00 2.30411894259
.gfids 0x00018000 0x00000110 0x00000200 1.89842473394
.rsrc 0x00019000 0x0001e000 0x0001dc00 7.25328017176
.reloc 0x00037000 0x0000101c 0x00001200 6.22268978227

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_ICON 0x00036110 0x00000128 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x00036398 0x00000022 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_GROUP_ICON 0x00036398 0x00000022 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_GROUP_ICON 0x00036398 0x00000022 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_GROUP_ICON 0x00036398 0x00000022 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_GROUP_ICON 0x00036398 0x00000022 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_VERSION 0x000363bc 0x000004e4 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x000368a0 0x0000017d LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library KERNEL32.dll:
0x40f004 GetModuleFileNameW
0x40f010 GetLastError
0x40f014 LoadLibraryA
0x40f018 lstrcatW
0x40f01c RaiseException
0x40f020 DecodePointer
0x40f024 GetProcAddress
0x40f02c CreateFileW
0x40f030 WriteConsoleW
0x40f034 SetFilePointerEx
0x40f038 GetConsoleMode
0x40f03c GetConsoleCP
0x40f040 FlushFileBuffers
0x40f044 GetStringTypeW
0x40f048 SetStdHandle
0x40f04c CloseHandle
0x40f050 GetFileType
0x40f054 GetProcessHeap
0x40f060 IsDebuggerPresent
0x40f064 OutputDebugStringW
0x40f070 MultiByteToWideChar
0x40f074 WideCharToMultiByte
0x40f078 LocalFree
0x40f088 GetStartupInfoW
0x40f08c GetModuleHandleW
0x40f094 GetCurrentProcessId
0x40f098 GetCurrentThreadId
0x40f0a0 InitializeSListHead
0x40f0a4 GetCurrentProcess
0x40f0a8 TerminateProcess
0x40f0ac RtlUnwind
0x40f0b0 SetLastError
0x40f0b4 EncodePointer
0x40f0b8 TlsAlloc
0x40f0bc TlsGetValue
0x40f0c0 TlsSetValue
0x40f0c4 TlsFree
0x40f0c8 FreeLibrary
0x40f0cc LoadLibraryExW
0x40f0d0 ExitProcess
0x40f0d4 GetModuleHandleExW
0x40f0d8 GetStdHandle
0x40f0dc WriteFile
0x40f0e0 GetCommandLineA
0x40f0e4 GetCommandLineW
0x40f0e8 GetACP
0x40f0ec HeapFree
0x40f0f0 HeapAlloc
0x40f0f4 HeapSize
0x40f0f8 HeapReAlloc
0x40f0fc CompareStringW
0x40f100 LCMapStringW
0x40f104 FindClose
0x40f108 FindFirstFileExW
0x40f10c FindNextFileW
0x40f110 IsValidCodePage
0x40f114 GetOEMCP
0x40f118 GetCPInfo
Library USER32.dll:
0x40f154 FindWindowW
0x40f158 ShowWindow
Library ole32.dll:
0x40f160 CoCreateInstance
Library OLEAUT32.dll:
0x40f124 VariantClear
0x40f128 SafeArrayGetDim
0x40f12c VariantInit
0x40f130 SafeArrayGetUBound
0x40f134 SafeArrayGetLBound
0x40f138 SysFreeString
0x40f13c SysAllocString
0x40f140 SafeArrayAccessData
0x40f144 GetErrorInfo
Library SHLWAPI.dll:
0x40f14c StrStrW

!This program cannot be run in DOS mode.
`.rdata
@.data
.gfids
@.rsrc
@.reloc
OLE3Pf
USERPf
QQSVWd
t!h$`A
j8h@FA
URPQQh
;t$,v-
UQPXY]Y[
j"^f91j\^u8
j"^f9q
t/j=[f;
taj*Xf
VWj\^j:
WWWPWS
PQhhaA
PQhpbA
SSVWh
f9:t!V
}VWj=S
tl9tX
QQSWj0j@
tl=hfA
PPPPPPPP
PPPPPWS
PP9E u:PPVWP
mSjA[jZ^+
8jZZf;
Unknown exception
bad allocation
bad array new length
bad exception
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
CorExitProcess
CompareStringEx
GetCurrentPackageId
LCMapStringEx
LocaleNameToLCID
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
?5Wg4p
%S#[k=
"B <1=
_hypot
_nextafter
wsprintfW
CoInitialize
CoCreateInstanceCoSetProxyBlankeCoInitializeSecu
.text$di
.text$mn
.text$x
.text$yd
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCL
.CRT$XCU
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$r
.rdata$sxdata
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.data$r
.gfids$x
.gfids$y
.rsrc$01
.rsrc$02
InterlockedDecrement
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
GetEnvironmentVariableW
GetLastError
LoadLibraryA
lstrcatW
RaiseException
DecodePointer
GetProcAddress
DeleteCriticalSection
KERNEL32.dll
FindWindowW
ShowWindow
USER32.dll
CoCreateInstance
ole32.dll
OLEAUT32.dll
StrStrW
SHLWAPI.dll
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
WideCharToMultiByte
LocalFree
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
RtlUnwind
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
HeapSize
HeapReAlloc
CompareStringW
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
GetFileType
CloseHandle
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
CreateFileW
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
ShellExecuteExW
.?AV_com_error@@
.?AVtype_info@@
.?AVbad_alloc@std@@
.?AVexception@std@@
.?AVbad_array_new_length@std@@
.?AVbad_exception@std@@
.?AVCAtlException@ATL@@
fldd|g
f||gldt||dp
lgflffVFp
73cc3cR0
vl|fV`
773c72a'#
2s27#c
s#cc42>
vlvvvv
ss27#%(~
nv|lv`
s7'3c(
3z77#h
{sss8u
W|~~ww
ss2s#s
lvvvfV
5gf~^W
3'7~vvg
j8($"!
kP5000($$"!
NJII5300((%$!!1$"!
RNMIH5300.($$!!2$#!
RRNIIH5f
%$!2($!!
_RRNJ[
%$#3($$!
k.%$8.($"!
CCBAA><<
kH330..$8.($$"
II533...90.($""
hMII5330.;0.(%#"
BA><<<
kXNI8H30.L00.(%#"
BBA><<
c[`N;530L300((#"!
><<<?<
O95V520(((#"
@><<E<
SP;XL530((#"
A>>@?=<
jVQPbQL830((#
CCAA@@E><<
lljh]e[`XQbVQ;830(%
CCBAAE><<
lllgeiigegcVQL83+(
CBAG@@<<
llgda_`dkXVO;31
GEG?@=<
Y[[Xaadaa____e]VO;8
EE?@=<<
-KPQS____RMN_fbU;
ws||rrqp
-8HMNNRR_MMNXbU
zxv~~}|t|rqp
&,28IIMJMNMONX
~~~||rtrq
'*245IJJNRk
|trrpo
||rrrpom
|||rrppo
}||rrrpo
~|||rrpp
~}||trrp
~~|||rrp
~~||trr
~~|||rr
~~||tt
WN'!1!
)+&&&!N$!
&GF+&$N&!
KKJ,+&R&$!
84242?
TK+W+&!
KSKcI+&!
odRaWcaSgOI'&
lmljSI+%
hdbb`amZJ-
/LQ`Q`MQhgX
xwuttst~
'1GMMMMQW
}}||tsrt
")GGLOm
jI&/TY)
]$ 'K!
2-/O'
*,$0T/!
,LZ-.!
cKR31WfL/'
mlmgL1
UXdcPjh\
{zyto|
+5MNNN[
h)-$9A<=8
+fJLy|::;~}
\YHUDMB
W^VsRN
wecXat
RHU@>z
:]PPk~*u9&
6tjhU`"
qDA,8E
zk*b#
h 18P;
P_gJ6P
hf?z+m
B2aE4~
8JD k`
zOa'n10pp~
p[a[A:
E G0m`
mcKID
Z/>>Q,-
$PX3b
<"Xut
e<QeF`:)
l9?'V^c
LnNms\W
Oo#"l:
*@+ydmB
$?f^Od
,}B]h7a
z}MycD
#0S3hZ
W&F~+$
xgQ`sc
^bj5Zx
Bxx7Xo
0Ry?Bd
Xnv K-d
N"`Rr('
NkshO
he\2r]
3>Ua'S$K
!FN9Q-X
)]C[P[Kd
M0CrhP
:vFOUO
:!y=IB
}sL4& 4
XXmajr
|w>9BB
bIDAT_
EH~1:z(
7cnn+V
nSlR;h
}0|404
gJ=ZS_A
;vLcfv
4aO]6`
gwLcff
RHU@>z
:]PPk~*u9&
6tjhU`"
qDA,8E
zk*b#
h 18P;
P_gJ6P
hf?z+m
B2aE4~
8JD k`
zOa'n10pp~
p[a[A:
E G0m`
mcKID
Z/>>Q,-
$PX3b
<"Xut
e<QeF`:)
l9?'V^c
LnNms\W
Oo#"l:
*@+ydmB
$?f^Od
,}B]h7a
z}MycD
#0S3hZ
W&F~+$
xgQ`sc
^bj5Zx
Bxx7Xo
0Ry?Bd
Xnv K-d
N"`Rr('
NkshO
he\2r]
3>Ua'S$K
!FN9Q-X
)]C[P[Kd
M0CrhP
:vFOUO
:!y=IB
}sL4& 4
XXmajr
|w>9BB
bIDAT_
EH~1:z(
7cnn+V
nSlR;h
}0|404
gJ=ZS_A
;vLcfv
4aO]6`
gwLcff
^9ogA
#rK/!lFo
^9gB
&{S#sL_ jD
$uN? kE
%xQ!!kEl
wwwwwwwwwwwwww
wwwwwwwwwwwwww
wwwwwwwwwwwwww
wwwwwwwwwwwwww
wwwwwwwwwwwwww
wwwwwwwwwwwwww
wwwwwwwwwwwwww
wwwwwwwwwwwwww
wwwwww
wwwwww
wwwwww
wwwwww
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBB
BBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBB
BBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBB
BBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBB
BBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBB
BBBBBB
BBBBBB
BBBBBB
BBBBBB
BBBBBB
BBBBBB
BBBBBB
BBBBBB
BBBBBB
BBBBBB
BBBBBB
BBBBBBBBB
BBBBBB
BBBBBB
BBBBBBBBBBBBBBB
BBBBBB
BBBBBB
BBBBBBBBBBBB
BBBBBB
BBBBBB
BBBBBB
BBBBBB
BBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
112=2V2y2
394C4N4
616@6L6w6
?6?s?y?
0R0o0~0
6.6C6J6P6b6l6
:4:::O:g:m:}:
<(</<e<n<{<
?!?'?O?U?{?
0'0-03090?0E0L0S0Z0a0h0o0v0~0
4K4P4T4X4\4
?6?D?J?e?
1(1.1>1c13V7
>!>8?a?}?
0<0L0c0k0
1=1F1K1P1t1
21292>2N2X2}2
5'545g5y5
5#6*6=6m6
7'8[9q9
:*:1:=:P:U:a:f:w:
;K;];e;o;x;
<"<q<{<
<4=?=D?N?m?t?
2+3>3M3n3
6:6?6L6X6q6
7%7.737@7E7R7`7g7o7
7-8T8n8
;K;Q;~;
;)<2<:<
0B0S0n0z0
161G1v1|1
262=2H2V2]2c2~2
3&3M3f3u3
474B4G4L4g4q4
595D5I5N5l5v5
6<6`6|6
7#7(7J7X7g7
<V=e=w=
=+>2>9>@>Z>i>s>
202>2G2|2
8/969@9V9
;!;=;a;
==,=9=P=
01.1<1Y1a1
3'393K3]3o3
4 424i5g7
:/;h;~;
2!202>2J2V2d2t2
3(3<3t3
3 474g4
>K?V?f?
2;2P2a2
2=3Y3x3
:#;-;{;
(070V0n0
2*222O2_2k2z2~3
3(4E4Y4d4
6K7L8\8m8u8
=E=O=j=
1<2W2m2
0;1@1D1H1L1
h1p1t1x1
1d2H4L4P4T4X4p4t4x4
6 6$6(6,6064686<6@6D6H6L6P6T6X6\6`6d6h6l6p6t6x6|6
7 7$7(7,7074787<7@7D7H7L7P7T7X7\7`7d7h7l7p7t7x7|7
0 0$0(0,0004080<0@0D0H0L0P0T0X0\0`0d0h0l0P5T5X5\5
9 9$9(9,9094989<9@9D9H9L9P9T9X9d9h9l9p9t9x9|9
0$0,040<0D0L0T0\0d0l0t0|0
1$1,141<1D1L1T1\1d1l1t1|1
2$2,242<2D2L2T2\2d2l2t2|2
3$3,343<3D3L3T3\3d3l3t3|3
4$4,444<4D4L4T4\4d4l4t4|4
5$5,545<5D5L5T5\5d5l5t5|5
6$6,646<6D6L6T6\6d6l6t6|6
7$7,74787@7H7P7X7`7h7p7x7
8 8(80888@8H8P8X8`8h8p8x8
9 9(90989@9H9P9X9`9h9p9x9
: :(:0:8:@:H:P:X:`:h:p:x:
; ;(;0;8;@;H;P;X;`;h;p;x;
< <(<0<8<@<H<P<X<`<h<p<x<
= =(=0=8=@=H=P=X=`=h=p=x=
> >(>0>8>@>H>P>
:$:,:4:<:D:L:T:\:d:l:t:|:
?0?@?D?T?X?\?d?|?
4$4,444<4D4P4p4|4
5 5(505D5\5`5|5
60686<6X6`6d6|6
7 7(70747<7P7p7
888X8x8
989X9x9
: :@:`:|:
6 6,60646P6T6h6l6p6t6x6|6
8(8P8p8
jjjjjj
ERROR : Unable to initialize critical section in CAtlBaseModule
@advapi32
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
mscoree.dll
Aapi-ms-win-appmodel-runtime-l1-1-1
api-ms-win-core-datetime-l1-1-1
api-ms-win-core-file-l2-1-1
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-kernel32-package-current-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
user32
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
((((( H
CONOUT$
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
Create
Win32_Process
ConsoleWindowClass
VS_VERSION_INFO
StringFileInfo
080904b0
CompanyName
RealVNC Ltd
FileDescription
Viewer
FileVersion
6.21.406 (r44671)
InternalName
vncviewer
LegalCopyright
Copyright
2002-2020 RealVNC Ltd.
LegalTrademarks
RealVNC and VNC are trademarks of RealVNC Ltd and are protected by trademark registrations and/or pending trademark applications in the European Union, United States of America and other jurisdictions.
OriginalFilename
vncviewer.exe
ProductName
ProductVersion
6.21.406 (r44671)
ProgramName
Viewer
VarFileInfo
Translation
Antivirus Signature
Bkav W32.AIDetect.malware2
Lionic Trojan.Win32.Manuscrypt.4!c
tehtris Clean
MicroWorld-eScan Trojan.GenericKD.64283876
FireEye Generic.mg.7c151e9e14789c5f
CAT-QuickHeal Backdoor.Manuscrypt
McAfee Artemis!7C151E9E1478
Cylance Unsafe
Zillya Clean
Sangfor Downloader.Win32.Manuscrypt.Vpdm
K7AntiVirus Riskware ( 00584baa1 )
BitDefender Trojan.GenericKD.64283876
K7GW Riskware ( 00584baa1 )
Cybereason malicious.560634
Arcabit Trojan.Generic.D3D4E4E4
Baidu Clean
VirIT Clean
Cyren W32/ABRisk.TGRO-4801
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/TrojanDownloader.Agent.GPC
APEX Malicious
Paloalto Clean
ClamAV Win.Dropper.Mokes-9905200-0
Kaspersky Backdoor.Win32.Manuscrypt.cd
Alibaba Backdoor:Win32/Manuscrypt.1cea0956
NANO-Antivirus Clean
ViRobot Clean
Rising Backdoor.Manuscrypt!8.110D5 (TFE:5:jNquyQxW7cL)
Ad-Aware Trojan.GenericKD.64283876
Sophos Mal/Generic-S
Comodo Clean
F-Secure Trojan.TR/Dldr.Agent.bdosp
DrWeb Clean
VIPRE Trojan.GenericKD.64283876
TrendMicro TROJ_GEN.R002C0DLE22
McAfee-GW-Edition RDN/Generic BackDoor
Trapmine suspicious.low.ml.score
CMC Clean
Emsisoft Trojan.GenericKD.64283876 (B)
Ikarus Trojan-Downloader.Win32.Agent
Jiangmin Backdoor.Manuscrypt.ai
Webroot Clean
Google Detected
Avira TR/Dldr.Agent.bdosp
MAX malware (ai score=83)
Antiy-AVL Trojan/Win32.Sabsik
Kingsoft Win32.Hack.Undef.(kcloud)
Gridinsoft Ransom.Win32.Sabsik.sa
Microsoft Trojan:Win32/Manuscrypt.NEAA!MTB
SUPERAntiSpyware Clean
ZoneAlarm Backdoor.Win32.Manuscrypt.cd
GData Win32.Trojan.PSE.1W9RM85
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.Vigorf.C5326147
Acronis Clean
VBA32 BScope.Backdoor.Manuscrypt
ALYac Trojan.GenericKD.64283876
TACHYON Clean
Malwarebytes Trojan.Downloader
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002C0DLE22
Tencent Malware.Win32.Gencirc.10bdb34b
Yandex Clean
SentinelOne Clean
MaxSecure Clean
Fortinet W32/PossibleThreat
BitDefenderTheta Gen:NN.ZexaE.36106.my0@amNxzifj
AVG Win32:DropperX-gen [Drp]
Avast Win32:DropperX-gen [Drp]
No IRMA results available.