Static | ZeroBOX

PE Compile Time

2022-07-17 02:26:04

PE Imphash

8461c300e4915effe1117a39053730dc

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00019d52 0x00019e00 4.6413677459
.data 0x0001b000 0x0171633c 0x00013000 7.91769546916
.rsrc 0x01732000 0x00010e28 0x00011000 3.96353239579

Resources

Name Offset Size Language Sub-language File type
RT_CURSOR 0x01740f90 0x000010a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40
RT_CURSOR 0x01740f90 0x000010a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40
RT_CURSOR 0x01740f90 0x000010a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40
RT_CURSOR 0x01740f90 0x000010a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40
RT_CURSOR 0x01740f90 0x000010a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40
RT_CURSOR 0x01740f90 0x000010a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_STRING 0x01742b18 0x0000030e LANG_TAMIL SUBLANG_DEFAULT data
RT_STRING 0x01742b18 0x0000030e LANG_TAMIL SUBLANG_DEFAULT data
RT_STRING 0x01742b18 0x0000030e LANG_TAMIL SUBLANG_DEFAULT data
RT_ACCELERATOR 0x0173f9d8 0x00000070 LANG_TAMIL SUBLANG_DEFAULT data
RT_GROUP_CURSOR 0x01742038 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x01742038 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x0173f970 0x00000068 LANG_TAMIL SUBLANG_DEFAULT data
RT_GROUP_ICON 0x0173f970 0x00000068 LANG_TAMIL SUBLANG_DEFAULT data
RT_GROUP_ICON 0x0173f970 0x00000068 LANG_TAMIL SUBLANG_DEFAULT data
RT_VERSION 0x01742068 0x0000028c LANG_NEUTRAL SUBLANG_NEUTRAL PGP symmetric key encrypted data - Plaintext or unencrypted data
None 0x0173fa68 0x0000000a LANG_TAMIL SUBLANG_DEFAULT data
None 0x0173fa68 0x0000000a LANG_TAMIL SUBLANG_DEFAULT data
None 0x0173fa68 0x0000000a LANG_TAMIL SUBLANG_DEFAULT data

Imports

Library KERNEL32.dll:
0x401004 CreateMutexW
0x401008 lstrcpynA
0x401014 HeapFree
0x401018 GetUserDefaultLCID
0x40101c WriteConsoleInputA
0x401020 BackupSeek
0x401028 GetModuleHandleW
0x40102c UnlockFileEx
0x401038 GetNumberFormatA
0x401044 WaitNamedPipeW
0x401048 GetCommandLineA
0x40104c GetVolumePathNameW
0x401050 ActivateActCtx
0x401054 GlobalAlloc
0x40105c LoadLibraryW
0x401060 FreeConsole
0x401064 GetCalendarInfoA
0x401068 GetConsoleWindow
0x401070 GetFileAttributesA
0x401074 IsDBCSLeadByte
0x40107c lstrlenW
0x401080 GetStringTypeExA
0x401088 EnumSystemLocalesA
0x40108c GetLastError
0x401094 GetProcAddress
0x401098 MoveFileW
0x40109c RemoveDirectoryA
0x4010a4 GlobalGetAtomNameA
0x4010a8 CreateSemaphoreW
0x4010ac WriteConsoleA
0x4010b0 OpenWaitableTimerW
0x4010b4 SetCalendarInfoW
0x4010b8 GetFileType
0x4010c0 AddAtomW
0x4010c4 GetProfileStringA
0x4010c8 VirtualLock
0x4010cc OpenJobObjectW
0x4010d0 FindNextFileA
0x4010d8 _lread
0x4010dc GetModuleHandleA
0x4010e4 EnumDateFormatsW
0x4010e8 PeekConsoleInputA
0x4010ec GetShortPathNameW
0x4010f0 FindFirstVolumeA
0x4010f4 SetFileShortNameA
0x4010f8 GetVersionExA
0x4010fc ReadConsoleInputW
0x401100 TerminateJobObject
0x401108 DeleteFileA
0x40110c lstrcpyA
0x401110 HeapReAlloc
0x40111c Sleep
0x40112c EncodePointer
0x401130 DecodePointer
0x401134 HeapAlloc
0x401138 HeapSetInformation
0x40113c GetStartupInfoW
0x401140 RtlUnwind
0x401144 ExitProcess
0x401148 WriteFile
0x40114c GetStdHandle
0x401150 GetModuleFileNameW
0x401154 HeapCreate
0x401160 IsDebuggerPresent
0x401164 TerminateProcess
0x401168 GetCurrentProcess
0x40116c HeapSize
0x401170 RaiseException
0x401174 GetModuleFileNameA
0x40117c WideCharToMultiByte
0x401184 SetHandleCount
0x40118c TlsAlloc
0x401190 TlsGetValue
0x401194 TlsSetValue
0x401198 TlsFree
0x40119c SetLastError
0x4011a0 GetCurrentThreadId
0x4011a8 GetTickCount
0x4011ac GetCurrentProcessId
0x4011b4 GetCPInfo
0x4011b8 GetACP
0x4011bc GetOEMCP
0x4011c0 IsValidCodePage
0x4011c4 GetStringTypeW
0x4011c8 MultiByteToWideChar
0x4011cc LCMapStringW
Library USER32.dll:
0x4011d4 CharUpperBuffW
Library WINHTTP.dll:

!This program cannot be run in DOS mode.
`.data
Unknown exception
bad allocation
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
CorExitProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
bad exception
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
GetProcessWindowStation
GetUserObjectInformationW
GetLastActivePopup
GetActiveWindow
MessageBoxW
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__eabi
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
lefuwo
pipehepexolecowenarixafilonuh
vokaxagik
turomowitulazasonagotop
jebujecolud
Lux hitocuma geh bocicaredo solebogi
hijotimayewasuxerocib
howorumazenatinu xazulivebafalulihoyevi wawusuyopicutigafaloyerutotemi
yifujek lotabemopejekiwoxe vajif fayakefaha mowixasacagosu
bipom sowesigicinatu muh mijefekofijevevufofaxo rigurujo
1#QNAN
1#SNAN
_nextafter
_hypot
QQSVWd
^SSSSS
j@j ^V
t=MOC
HtHu4j
t*=RCC
;7|G;p
tR99u2
PPPPPPPP
PPPPPPPP
u}hD*@
URPQQh
;t$,v-
UQPXY]Y[
t"SS9] u
L$ QPPPP
tRHtCHt4Ht%HtFHHt
<+t"<-t
+t HHt
u-h\7@
GetVolumeNameForVolumeMountPointA
CreateMutexW
lstrcpynA
DeleteVolumeMountPointA
InterlockedIncrement
HeapFree
GetUserDefaultLCID
WriteConsoleInputA
BackupSeek
FreeEnvironmentStringsA
GetModuleHandleW
UnlockFileEx
FindNextVolumeMountPointA
GetConsoleAliasesLengthA
GetNumberFormatA
GetWindowsDirectoryA
GetConsoleAliasExesW
WaitNamedPipeW
GetCommandLineA
GetVolumePathNameW
ActivateActCtx
GlobalAlloc
GetPrivateProfileIntA
LoadLibraryW
FreeConsole
GetCalendarInfoA
GetConsoleWindow
GetConsoleAliasExesLengthW
GetFileAttributesA
IsDBCSLeadByte
GetCompressedFileSizeA
lstrlenW
GetStringTypeExA
GetNamedPipeHandleStateW
EnumSystemLocalesA
GetLastError
ReadConsoleOutputCharacterA
GetProcAddress
MoveFileW
RemoveDirectoryA
EnterCriticalSection
GlobalGetAtomNameA
CreateSemaphoreW
WriteConsoleA
OpenWaitableTimerW
SetCalendarInfoW
GetFileType
BuildCommDCBAndTimeoutsW
AddAtomW
GetProfileStringA
VirtualLock
OpenJobObjectW
FindNextFileA
CreateIoCompletionPort
_lread
GetModuleHandleA
GetCurrentDirectoryA
EnumDateFormatsW
PeekConsoleInputA
GetShortPathNameW
FindFirstVolumeA
SetFileShortNameA
GetVersionExA
ReadConsoleInputW
TerminateJobObject
MoveFileWithProgressW
DeleteFileA
lstrcpyA
KERNEL32.dll
CharUpperBuffW
USER32.dll
WinHttpGetProxyForUrl
WINHTTP.dll
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapAlloc
HeapSetInformation
GetStartupInfoW
RtlUnwind
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapSize
RaiseException
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
IsProcessorFeaturePresent
HeapReAlloc
LCMapStringW
.?AVfacet@locale@std@@
.?AV_Locimp@locale@std@@
Copyright (c) 1992-2004 by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
.?AVtype_info@@
.?AVbad_exception@std@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AV?$basic_stringbuf@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@
.?AV?$basic_streambuf@DU?$char_traits@D@std@@@std@@
.?AVexception@std@@
!!`pqw#
ObdN:7
2/hO_l
3G<Bc-
GJGy6%
eN}A{qgW
s=oXsB
'z78gH
\P0ZkD
R6z]V@
P5<`Kc
tF'l(#
#oEzD
kRFx9ni
DFx9ni
5Fx9ni
{!gXXn
iho]mj
iho]mj
AQ%%Gt
nR:'je/
l~;._y
4m839#:4
oVU5jNP
ej)4P}
:StIQ;
+)'5OT9
'I>u?Br
u?al~7
iZ^UdL
[Na|K#;B
.N0=SM
[yVn& <
rdju)@[?}
COjEMDF
M[^83IR
S"'`G>
xv 9po
PIo{=.G;$
v#B!NP
k?yevCY
d|+*NS"
Djr[|&
bQcZ9
9l1@9D
:/%8:
5<I Z|QS
0Vpnxi;
:d@EP_
g <F@7&
e\:xqW
)J`9E,
.87=z[z
4twyHu
/nifAC
=#_*08
M_UAW\3q
!}i#;O_
}Ie\Lw!
vK(I65r
C1 }^9
H($o4n
^hoK:TC
"y',\;
fB%(R1
~!{Op)
Y)c\K^
P84!j
T~0oDb1
fV1.X
'2jhY_8
EQqh;Ig
s0!id&
?SD}?B
Lq@C~`
rv3-,k
-c]n|)
Gk,dt\
n$q@kN
72a:~x
FAaVmuj
;XEVLKt
!}\42sJ%
=|nIxL
OD7(FE
_i-izIv
aJ^k1%s/
>oq]Tw
tJ]E%Idw
7_Q?qy
ESaxdC"
J."d]U
ukuS{'
*4%{Ft
b7towe:B
E"`]EHc{
o]',z1
$pD_A[H
){m{ge,
r(l-uP
#`ex`l!A
AR]*^7MWG
J/[>$
oE36c=
a~VLr-`8
\39iv@)XE8
w-8Dz[
*cwZG.
6^.CqJ
Pcvr.1
eb=3:2
\x ZA!os
0K*?:P <
"?V8r9
Hik=?
>`&(*MI
wj_PUD4
U`~qokT
%$]c4n
[tB`O<
sK9uEx
>7FjV:
g!xF&BA
_me4~R
o;CX(\
^.ew\a
__aPFG+bU
d&{c1d
zr>$E
:A'~L')
K-u W4}
A6(*jt
;L?/!>&Tk
_WxMWK)
Zi==I:G
Sd_I+
"3z{-s)
I% Bda
\k&g\v
IH$af&G
:V.o ;
EO=OCx(
g,fWF_
+(`:pz
8ZR'*l
.?AVbad_alloc@std@@
r@@@@@@@@@@@@@
jrruuuuuu@
r@@@@@@r@j
u@@@@@@@@@
r@@@@@@@@@@@@@
jjjjjj
[[[[[[[[[[[[[[
'>''''o
"""""""""
8III***
888III*
88ItA"o'
vvvvvvvak
/////////////////////////////////////m
"""""""""
LLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLL
$VmqV"&
LLLLLLLLL
++qLLLLLLLLL
KVLLLLLLLLL
LLLLLLLLL
LLLLLLLLL
LLLLLLLLL
LLLLLLLLL
VLLLLLLLLL
VLLLLLLLLL
tD\LLLLLLLLL
LLLLLLLLL
LLLLLLLL1
&LLLLLLLLLu!
LLLLLLLLL
LLLLLLLLL
Pk}LLLLLLLL
LLLLLLLLL
&LLLLLLLLL
HLLLLLLLL1r8
{LLLLLLLL
2LLLLLLLL
;2LLLLLLL
'E42LLLLLL
9NLLLLL
9<LLLLL1
#yLLLLLL1.
LLLLLF
FLLLLLLL
LLLLLLL2
LLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLL
~{{}|}
||y{{}
{|{{~z
|}}y}y~{
}~~|~{{
}}}~{~
|~z||}
~{{y~|}
y~~|~|
}|}{|}~~~|
||{|}{
}~}}{{
~{~|~{
~|z}{~
|}~}}}{
}~|{z}z
|~}}{|
|}{y{z
~~}z}~~
z~z|zz
}}~~{z
|~}{{}~{
}{|}~{{
(((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((
j(((((((((((((((((((((((j
(((((((((((((((((((((
(((((((((((((((((((
(((((((((((((((((((((j<m
(((((((((((((((
m<j(((((((((((((((((((((
~(((((((((((~
(((((((((((((((((((((~
~(((((((~
~((((((((((((((((((((((
(((((((((((((((((((((((
>nnnnn
(((((((((((((((((((((((
mnnnnnn
(((((((((((((((((((((((j*nnnnnnnnnn
nnnnnnnnnn*j(((((((((((((((((((((((
n;;;;;;;;;n;;
((((((((((((((((((((((((
-----------
(((((((((((((((((((((((((
(((((((((((((((((((((((((
(((((((((((((((((((((((((
NNNNNNNNNNN
(((((((((((((((((((((((((jC;^N^N^^N^N^^^^^^^^
Cj(((((((((((((((((((((((((
(((((((((((((((((((((((
((((((((((((((((((((
((((((((((((((((((
PPPPPPPPPPPPPPPPPPPPP
((((((((((((((((
((((((((((((((
%%%%%%%%%%%%%
((((((((((((
((((((((((
((((((((
P999999999999999999E9999999999E9
((((((
EEEEEEEEEEEEEEEEEEEEEEEEEEE9P
(((((((((~
~((((((((((((((((((((~
WWWWWWWWW
~(((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((((
((((((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((((((j
j((((((((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((((((((j
j((((((((((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((((((((((j
j((((((((((((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((((((((((((j
j((((((((((((((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((((((((((((((j
j((((((((((((((((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((
DDDDDDDD
::::::::://://
ccccccccccccccccccc
-ccccZjcccccccc
cccccccc
ccccccccjNNNNN
TccccccccB
a5ccccccc
cccccc58
zwccccccccccc!b
`ccccccccccccw
zccccccccccccccB`ccccccccccccccwcccccccccccccccccccccccccccccccccccccccc
mscoree.dll
runtime error
TLOSS error
SING error
DOMAIN error
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
- abort() has been called
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
@Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
KERNEL32.DLL
((((( H
h(((( H
H
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
WUSER32.DLL
wekexujunifatohikedazuci
Vum xiz libidaduviyifererohucunomavoceb wobidedesegoyuxiduyezucoboxi
tozefudid xohosixekolujegasegahila
vazecacivodusasa
pdapetiyibif terepezexiyowotulejegavuh
guxacijanabakobicecuvivij jarificex
kuvimodumutesaci mudesiyesuzukubigotujeditip lunofuyarederekamadowatosurizizu
basupihavucivoguhukokeyunidedo
pusapoka volubawoganaz
domemukocoketejosawi
yemutecutole
jjjjjjj
VS_VERSION_INFO
StringFileInfo
029185B1
CompanyName
Cheesecake
FileDescriptions
FileVersion
21.35.88.76
InternalName
NoMoreWolf.exe
LegalCopyrights
Challengers mazambic
ProductName
NowayTripper
ProductVersion
50.35.24.62
VarFileInfo
Translation
5Yosudeputisoroz dawasawewaz lip waletev riwinaradakew$Xikoxob wonaremih ravozonafizowe hiz
Gimijeweyas bunonobifabtXajisejecabay vilukafuzapu yigoy wotenavicosaj gohafulogexi luyotozoruyimo hanaxemafat xupefo foruce paputilexuyizod
Nagewudekoweviy sohumupofifok
Dadomuresi lumuyu paxihakaAXopepuyojano wikufi bamuzixejapop yuvem xoka vop kihoxub fapesufo.Bilopalitafoyi funexacasatat kuzula matusukusaPZuda rizugosok fuxoguzoh sojumot behehipimici sesonigazegoni manixiri wuhutimezi
WHawajek xopijecepe fixa kis jugesowocewexa diwajoc duraz sucobipebom yewawisuv suweyori
Yunedi honaroneg jeme cewaja8Puyononozufu xegihelofiduk fer gomuyuvusaji hivitetufagi
MHobuluwe padi neletuvoli misodu cepubo lovujom caxixosexijoj tero selecejejeyaNiramekocefe xixojabo zenu vozuzinicaci hepozuvox vakiserusorisab sugipinolez hasepoha hefenanawu
XDizoh fup bukapayisakuwot mofakima coza xosovoweyaketi cakapubuwolazi fogujayojux wikiru
bHuvutazopihin sidoletosod xodiperipopax zavijujon juraxuvenan yuroxox hufel gucuzanelonifi mufadep
"Jer wusasi pojecutewih hopamecamirPGasazig wejazijogih yodewoyoyixa koyilutazuv risumisisopuhi jiwunof viku waresoc"Konewikipudu kikagenuc fivaxuledudIPawameb lahixiluxexes vipuwugico helilafim mozu rigakajul kotoboginixaroy0Cisaninuzive tobop sosukotasokacu jihacakubumalijFeficaduhe gudakodamesu hotecipuho lanijivusapaluj sajibosedirik soti zinadelufejibo zikuveh yecin nacodok
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Clean
Elastic malicious (high confidence)
DrWeb Clean
MicroWorld-eScan Clean
CMC Clean
CAT-QuickHeal Ransom.Stop.P5
McAfee Clean
Malwarebytes Clean
VIPRE Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 00516fdf1 )
BitDefender Clean
K7GW Trojan ( 00516fdf1 )
CrowdStrike win/malicious_confidence_100% (D)
BitDefenderTheta Clean
VirIT Clean
Cyren W32/Kryptik.KDS1.gen!Eldorado
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 Clean
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky VHO:Backdoor.Win32.Mokes.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Trojan.Generic@AI.92 (RDML:6+L63i8xYHiuBbCAtvsnwA)
Sophos ML/PE-A
F-Secure Clean
Baidu Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Lockbit.dm
Trapmine malicious.high.ml.score
FireEye Generic.mg.9749f1713629f82f
Emsisoft Clean
Ikarus Clean
GData Clean
Jiangmin Clean
Webroot Clean
Google Detected
Avira Clean
MAX Clean
Antiy-AVL Clean
Gridinsoft Ransom.Win32.STOP.dg!n
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm VHO:Backdoor.Win32.Mokes.gen
Microsoft Trojan:Win32/Wacatac.B!ml
Cynet Malicious (score: 100)
AhnLab-V3 Clean
Acronis Clean
VBA32 Clean
ALYac Clean
TACHYON Clean
DeepInstinct MALICIOUS
Cylance unsafe
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Trojan.Win32.Obfuscated.gen
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet Clean
AVG Clean
Cybereason malicious.caf71e
Avast Clean
No IRMA results available.