Static | ZeroBOX

PE Compile Time

2022-10-16 14:06:34

PE Imphash

159100750a8951afbf1c5236a35f7df6

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00019d6a 0x00019e00 4.64426338159
.data 0x0001b000 0x0171661c 0x00013400 7.9055518164
.rsrc 0x01732000 0x00010e28 0x00011000 3.96384444089

Resources

Name Offset Size Language Sub-language File type
RT_CURSOR 0x01740f90 0x000010a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40
RT_CURSOR 0x01740f90 0x000010a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40
RT_CURSOR 0x01740f90 0x000010a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40
RT_CURSOR 0x01740f90 0x000010a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40
RT_CURSOR 0x01740f90 0x000010a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40
RT_CURSOR 0x01740f90 0x000010a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0173f508 0x00000468 LANG_TAMIL SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_STRING 0x01742b18 0x0000030e LANG_TAMIL SUBLANG_DEFAULT data
RT_STRING 0x01742b18 0x0000030e LANG_TAMIL SUBLANG_DEFAULT data
RT_STRING 0x01742b18 0x0000030e LANG_TAMIL SUBLANG_DEFAULT data
RT_ACCELERATOR 0x0173f9d8 0x00000070 LANG_TAMIL SUBLANG_DEFAULT data
RT_GROUP_CURSOR 0x01742038 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x01742038 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x0173f970 0x00000068 LANG_TAMIL SUBLANG_DEFAULT data
RT_GROUP_ICON 0x0173f970 0x00000068 LANG_TAMIL SUBLANG_DEFAULT data
RT_GROUP_ICON 0x0173f970 0x00000068 LANG_TAMIL SUBLANG_DEFAULT data
RT_VERSION 0x01742068 0x00000290 LANG_NEUTRAL SUBLANG_NEUTRAL MS Windows COFF PA-RISC object file
None 0x0173fa68 0x0000000a LANG_TAMIL SUBLANG_DEFAULT data
None 0x0173fa68 0x0000000a LANG_TAMIL SUBLANG_DEFAULT data
None 0x0173fa68 0x0000000a LANG_TAMIL SUBLANG_DEFAULT data

Imports

Library KERNEL32.dll:
0x401004 CreateMutexW
0x401008 lstrcpynA
0x401018 OpenJobObjectA
0x40101c HeapFree
0x401020 GetUserDefaultLCID
0x401024 WriteConsoleInputA
0x401028 BackupSeek
0x40102c GetModuleHandleW
0x401030 UnlockFileEx
0x40103c GetNumberFormatA
0x401044 WaitNamedPipeW
0x401048 GetCommandLineA
0x40104c GetVolumePathNameW
0x401050 ActivateActCtx
0x401054 GlobalAlloc
0x40105c LoadLibraryW
0x401060 FreeConsole
0x401064 GetCalendarInfoA
0x401068 GetFileAttributesA
0x40106c IsDBCSLeadByte
0x401074 lstrlenW
0x401078 GetStringTypeExA
0x401080 EnumSystemLocalesA
0x401084 GetLastError
0x40108c GetProcAddress
0x401090 MoveFileW
0x401094 RemoveDirectoryA
0x40109c GlobalGetAtomNameA
0x4010a0 CreateSemaphoreW
0x4010a4 WriteConsoleA
0x4010a8 OpenWaitableTimerW
0x4010ac GetFileType
0x4010b4 AddAtomW
0x4010b8 GetProfileStringA
0x4010bc VirtualLock
0x4010c4 FindNextFileA
0x4010cc _lread
0x4010d8 EnumDateFormatsW
0x4010dc PeekConsoleInputA
0x4010e0 GetShortPathNameW
0x4010e4 SetCalendarInfoA
0x4010e8 FindFirstVolumeA
0x4010ec SetFileShortNameA
0x4010f0 GetVersionExA
0x4010f4 ReadConsoleInputW
0x4010f8 TerminateJobObject
0x401108 DeleteFileA
0x40110c lstrcpyA
0x401110 HeapReAlloc
0x401118 MultiByteToWideChar
0x401120 Sleep
0x401130 EncodePointer
0x401134 DecodePointer
0x401138 HeapAlloc
0x40113c HeapSetInformation
0x401140 GetStartupInfoW
0x401144 RtlUnwind
0x401148 ExitProcess
0x40114c WriteFile
0x401150 GetStdHandle
0x401154 GetModuleFileNameW
0x401158 HeapCreate
0x401164 IsDebuggerPresent
0x401168 TerminateProcess
0x40116c GetCurrentProcess
0x401170 HeapSize
0x401174 RaiseException
0x401178 GetModuleFileNameA
0x40117c WideCharToMultiByte
0x401184 SetHandleCount
0x40118c TlsAlloc
0x401190 TlsGetValue
0x401194 TlsSetValue
0x401198 TlsFree
0x40119c SetLastError
0x4011a0 GetCurrentThreadId
0x4011a8 GetTickCount
0x4011ac GetCurrentProcessId
0x4011b4 GetCPInfo
0x4011b8 GetACP
0x4011bc GetOEMCP
0x4011c0 IsValidCodePage
0x4011c4 GetStringTypeW
0x4011c8 LCMapStringW
Library USER32.dll:
0x4011d0 CharUpperBuffW
0x4011d4 GetMessagePos
Library WINHTTP.dll:

!This program cannot be run in DOS mode.
`.data
Unknown exception
bad allocation
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
CorExitProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
bad exception
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
GetProcessWindowStation
GetUserObjectInformationW
GetLastActivePopup
GetActiveWindow
MessageBoxW
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__eabi
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
fotujusufogejikehejorumote
lefuwo
pipehepexolecowenarixafilonuh
cexevoxinakidahewaxuhuwifihapedixe
vokaxagik
turomowitulazasonagotop
jebujecolud
Lux hitocuma geh bocicaredo solebogi
kahuvamecakilijuniyijo
hijotimayewasuxerocib
howorumazenatinu xazulivebafalulihoyevi wawusuyopicutigafaloyerutotemi
yifujek lotabemopejekiwoxe vajif fayakefaha mowixasacagosu
bipom sowesigicinatu muh mijefekofijevevufofaxo rigurujo
1#QNAN
1#SNAN
_nextafter
_hypot
QQSVWd
^SSSSS
j@j ^V
t=MOC
HtHu4j
t*=RCC
;7|G;p
tR99u2
PPPPPPPP
PPPPPPPP
u}hD*@
URPQQh
;t$,v-
UQPXY]Y[
t"SS9] u
L$ QPPPP
tRHtCHt4Ht%HtFHHt
<+t"<-t
+t HHt
u-h<7@
GetVolumeNameForVolumeMountPointA
CreateMutexW
lstrcpynA
GetConsoleAliasExesLengthA
DeleteVolumeMountPointA
InterlockedIncrement
OpenJobObjectA
HeapFree
GetUserDefaultLCID
WriteConsoleInputA
BackupSeek
GetModuleHandleW
UnlockFileEx
FindNextVolumeMountPointA
GetConsoleAliasesLengthA
GetNumberFormatA
GetConsoleAliasExesW
WaitNamedPipeW
GetCommandLineA
GetVolumePathNameW
ActivateActCtx
GlobalAlloc
GetPrivateProfileIntA
LoadLibraryW
FreeConsole
GetCalendarInfoA
GetFileAttributesA
IsDBCSLeadByte
GetCompressedFileSizeA
lstrlenW
GetStringTypeExA
GetNamedPipeHandleStateW
EnumSystemLocalesA
GetLastError
ReadConsoleOutputCharacterA
GetProcAddress
MoveFileW
RemoveDirectoryA
EnterCriticalSection
GlobalGetAtomNameA
CreateSemaphoreW
WriteConsoleA
OpenWaitableTimerW
GetFileType
BuildCommDCBAndTimeoutsW
AddAtomW
GetProfileStringA
VirtualLock
GetPrivateProfileSectionNamesA
FindNextFileA
CreateIoCompletionPort
_lread
FreeEnvironmentStringsW
GetCurrentDirectoryA
EnumDateFormatsW
PeekConsoleInputA
GetShortPathNameW
SetCalendarInfoA
FindFirstVolumeA
SetFileShortNameA
GetVersionExA
ReadConsoleInputW
TerminateJobObject
GetWindowsDirectoryW
MoveFileWithProgressW
GetConsoleProcessList
DeleteFileA
lstrcpyA
KERNEL32.dll
GetMessagePos
CharUpperBuffW
USER32.dll
WinHttpGetProxyForUrl
WINHTTP.dll
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapAlloc
HeapSetInformation
GetStartupInfoW
RtlUnwind
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapSize
RaiseException
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
IsProcessorFeaturePresent
HeapReAlloc
LCMapStringW
.?AVfacet@locale@std@@
.?AV_Locimp@locale@std@@
Copyright (c) 1992-2004 by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
.?AVtype_info@@
.?AVbad_exception@std@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AV?$basic_stringbuf@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@
.?AV?$basic_streambuf@DU?$char_traits@D@std@@@std@@
.?AVexception@std@@
/nhh<
?5k~Z|1
EWe^F,e
Obg_BtrONl
lN4X!m
X1i\}=97
+L~~"a,p
xtvDc
@jr'+UwbF
`w>II%`
,m^R*+P>
Ga-MDp\
e.UsspG
$qnXV|
9b/QcI/
)DOg?X
v*+Pm,y
v`QTL-}
ob+;Gq
dza.^_
2<2l:|
'EsZ=^1
:#%;|,3
B1S6?^f8
/&hO$Cc
y:V4g8
{H-R!O
NQatRF
n glvD}sH
RH~jyU
`XwywT
w3D+j
lvip|O
'|'fpm
'O4N6B
~a\a9H
mA[Om6
uy]f;C
q?;j/$?
GAs;WB
GAs;WB
'.AwU'
Yh+W/]
GAs;WB
GAs;WB
\i/~cY
=Fz+/Q
.%ouGj
2EGB]0
_f=4q"
,jJJ#?
x%R~R{kw
\t$5}"
|%0xY?
J6J!4&
=f-,pSdM
\6vK7M 5
;X(U#<
/uPx}'
=iQsI|lQGn
~gn\(4PF
V)&`>@T
eege6HgN
I!5[*J
=hX=XOb
H;ZvC
(kZ1xQ
Deuthu
Q"Ssk9A
VwNQES
Fesm_MY
$h)GW7$
7q)tAME
6W;u:M
~U\0x2
3hON-&<
;R+?fcr
K=[k?##
,`mC(t>
TyVl5|
'VThwo
llbv6[
}j_xw>
5E#l5P
zj80$?
U1y'~-e8
>,dWxh
9i?pL3
Hn{RuWhV
jB^#h&\W(
us!RNA
RkYe6s
:Feegy
Rjg3[+De
#AKvmw
'LqKj|
L *!$@'L
S@Fho@
~pmIzh^,
(!p9H%N,
Udljf<
hXqclD
gdv:U1Q
P|=Q}\
6?\~. yv
gwlh`
fqvtv>
U)'S)U
9/M88`_x
)+)nlX
Fa%937iEd
#qOeh;!
/lP`pZ
4a(<'t
Kvm=~*)
uSAU?#KW
&9/&&r
5W&C^(
\}5.^5y
Fe"$'/~w
5"-J;
&XP<_
gPXqCp
i/7dLvH&
c9Ag_:
F7|l9Y
4;qzQQ
hY.P1W
tQ4#Ee
HM"^%Q
dS"mXWU_l~tC9J
PpLZ/\Y
fl3C]V
.?AVbad_alloc@std@@
r@@@@@@@@@@@@@
jrruuuuuu@
r@@@@@@r@j
u@@@@@@@@@
r@@@@@@@@@@@@@
jjjjjj
[[[[[[[[[[[[[[
'>''''o
"""""""""
8III***
888III*
88ItA"o'
vvvvvvvak
/////////////////////////////////////m
"""""""""
//////////////////////////////////\F
/////////A+
M/////////
L/////////
uqn/////////
/////////
/////////A
/////////
L/////////
L/////////
/////////
W/////////A}I
////////=,Q
Y/////////
/////////R
/////////
////////$
/////////
Y/////////
////////=zKV
////////
////////
///////$
//////
{/////=
///OJ#
//////=
'RA/////
///////\A6
///////
//////////////////////////////////////////////////////////////////////////////////////////////////////
|{z|~~|
}|{{}|
}|}~~z
}}|}~}
~||}{|
y}|zz~z
y~{{}~~}
}z|z{|
|z{|}z
~~{~}}
}y}|||
}|~~~{|
}|}z|~}~}
|||~{~
z}{|{|{
{}||z}
~|{|~z|}z
{||}}}{z
{}|~||
~~||}~
|{|~zy
}y|{~~
|}}~~|
~~y}|~
(((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((
j(((((((((((((((((((((((j
(((((((((((((((((((((
(((((((((((((((((((
(((((((((((((((((((((j<m
(((((((((((((((
m<j(((((((((((((((((((((
~(((((((((((~
(((((((((((((((((((((~
~(((((((~
~((((((((((((((((((((((
(((((((((((((((((((((((
>nnnnn
(((((((((((((((((((((((
mnnnnnn
(((((((((((((((((((((((j*nnnnnnnnnn
nnnnnnnnnn*j(((((((((((((((((((((((
n;;;;;;;;;n;;
((((((((((((((((((((((((
-----------
(((((((((((((((((((((((((
(((((((((((((((((((((((((
(((((((((((((((((((((((((
NNNNNNNNNNN
(((((((((((((((((((((((((jC;^N^N^^N^N^^^^^^^^
Cj(((((((((((((((((((((((((
(((((((((((((((((((((((
((((((((((((((((((((
((((((((((((((((((
PPPPPPPPPPPPPPPPPPPPP
((((((((((((((((
((((((((((((((
%%%%%%%%%%%%%
((((((((((((
((((((((((
((((((((
P999999999999999999E9999999999E9
((((((
EEEEEEEEEEEEEEEEEEEEEEEEEEE9P
(((((((((~
~((((((((((((((((((((~
WWWWWWWWW
~(((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((((
((((((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((((((j
j((((((((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((((((((j
j((((((((((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((((((((((j
j((((((((((((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((((((((((((j
j((((((((((((((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((((((((((((((j
j((((((((((((((((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((
DDDDDDDD
::::::::://://
ccccccccccccccccccc
-ccccZjcccccccc
cccccccc
ccccccccjNNNNN
TccccccccB
a5ccccccc
cccccc58
zwccccccccccc!b
`ccccccccccccw
zccccccccccccccB`ccccccccccccccwcccccccccccccccccccccccccccccccccccccccc
mscoree.dll
runtime error
TLOSS error
SING error
DOMAIN error
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
- abort() has been called
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
@Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
KERNEL32.DLL
((((( H
h(((( H
H
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
WUSER32.DLL
wekexujunifatohikedazuci
Vum xiz libidaduviyifererohucunomavoceb wobidedesegoyuxiduyezucoboxi
vazecacivodusasa
pdapetiyibif terepezexiyowotulejegavuh
guxacijanabakobicecuvivij jarificex
kuvimodumutesaci mudesiyesuzukubigotujeditip lunofuyarederekamadowatosurizizu
basupihavucivoguhukokeyunidedo
domemukocoketejosawi
yemutecutole
jjjjjjj
VS_VERSION_INFO
StringFileInfo
029185B1
CompanyName
CheesePlease
FileDescriptions
FileVersion
21.35.88.76
InternalName
NoMoreWolf.exe
LegalCopyrights
Challengers mazambic
ProductName
NowayTripper
ProductVersion
50.35.24.62
VarFileInfo
Translation
5Yosudeputisoroz dawasawewaz lip waletev riwinaradakew$Xikoxob wonaremih ravozonafizowe hiz
Gimijeweyas bunonobifabtXajisejecabay vilukafuzapu yigoy wotenavicosaj gohafulogexi luyotozoruyimo hanaxemafat xupefo foruce paputilexuyizod
Nagewudekoweviy sohumupofifok
Dadomuresi lumuyu paxihakaAXopepuyojano wikufi bamuzixejapop yuvem xoka vop kihoxub fapesufo.Bilopalitafoyi funexacasatat kuzula matusukusaPZuda rizugosok fuxoguzoh sojumot behehipimici sesonigazegoni manixiri wuhutimezi
WHawajek xopijecepe fixa kis jugesowocewexa diwajoc duraz sucobipebom yewawisuv suweyori
Yunedi honaroneg jeme cewaja8Puyononozufu xegihelofiduk fer gomuyuvusaji hivitetufagi
MHobuluwe padi neletuvoli misodu cepubo lovujom caxixosexijoj tero selecejejeyaNiramekocefe xixojabo zenu vozuzinicaci hepozuvox vakiserusorisab sugipinolez hasepoha hefenanawu
XDizoh fup bukapayisakuwot mofakima coza xosovoweyaketi cakapubuwolazi fogujayojux wikiru
bHuvutazopihin sidoletosod xodiperipopax zavijujon juraxuvenan yuroxox hufel gucuzanelonifi mufadep
"Jer wusasi pojecutewih hopamecamirPGasazig wejazijogih yodewoyoyixa koyilutazuv risumisisopuhi jiwunof viku waresoc"Konewikipudu kikagenuc fivaxuledudIPawameb lahixiluxexes vipuwugico helilafim mozu rigakajul kotoboginixaroy0Cisaninuzive tobop sosukotasokacu jihacakubumalijFeficaduhe gudakodamesu hotecipuho lanijivusapaluj sajibosedirik soti zinadelufejibo zikuveh yecin nacodok
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.68153794
CMC Clean
CAT-QuickHeal Ransom.Stop.P5
ALYac Clean
Cylance unsafe
Zillya Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 00516fdf1 )
BitDefender Trojan.GenericKD.68153794
K7GW Trojan ( 00516fdf1 )
CrowdStrike win/malicious_confidence_100% (W)
Baidu Clean
VirIT Clean
Cyren Clean
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of Win32/Kryptik.HUBA
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky UDS:DangerousObject.Multi.Generic
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Trojan.Generic@AI.92 (RDML:deGMGpMeI72nJBAzNR/ooQ)
Sophos Mal/Generic-S
F-Secure Clean
DrWeb Trojan.Packed2.45444
VIPRE Gen:Variant.Mikey.148309
TrendMicro Trojan.Win32.FRS.VSNW0DG23
McAfee-GW-Edition BehavesLike.Win32.Lockbit.dh
Trapmine malicious.high.ml.score
FireEye Generic.mg.e716168756c85d96
Emsisoft Trojan.GenericKD.68153794 (B)
SentinelOne Static AI - Suspicious PE
Jiangmin Clean
Webroot W32.Trojan.Gen
Google Detected
Avira Clean
MAX malware (ai score=88)
Antiy-AVL Clean
Microsoft Trojan:Win32/Leonem
Gridinsoft Trojan.Win32.SmokeLoader.bot
Xcitium Clean
Arcabit Trojan.Mikey.D24355
SUPERAntiSpyware Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
GData Win32.Trojan.PSE.1BB5NL7
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.Generic.R590689
Acronis Clean
McAfee Artemis!E716168756C8
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Clean
Malwarebytes Trojan.MalPack.GS
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Trojan.Win32.FRS.VSNW0DG23
Tencent Trojan.Win32.Obfuscated.gen
Yandex Clean
Ikarus Trojan.Win32
MaxSecure Trojan.Malware.300983.susgen
Fortinet Clean
BitDefenderTheta Clean
AVG Win32:TrojanX-gen [Trj]
Cybereason malicious.13866c
Avast Win32:TrojanX-gen [Trj]
No IRMA results available.