Static | ZeroBOX

PE Compile Time

2022-06-16 03:38:57

PDB Path

C:\mojogoxal\vipexuhoz\yumodosebiy88\zoyizusuwax\sub87\lawivi1.pdb

PE Imphash

a595d661f58820d2ee9ed8c0dc92dfd2

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00052742 0x00052800 7.81426261731
.data 0x00054000 0x0147cc3c 0x00002000 2.93287391186
.rsrc 0x014d1000 0x00003fe0 0x00004000 4.07405313295
.reloc 0x014d5000 0x0000b730 0x0000b800 0.914352510265

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x014d3e60 0x00000468 LANG_PORTUGUESE SUBLANG_PORTUGUESE_BRAZILIAN GLS_BINARY_LSB_FIRST
RT_ICON 0x014d3e60 0x00000468 LANG_PORTUGUESE SUBLANG_PORTUGUESE_BRAZILIAN GLS_BINARY_LSB_FIRST
RT_ICON 0x014d3e60 0x00000468 LANG_PORTUGUESE SUBLANG_PORTUGUESE_BRAZILIAN GLS_BINARY_LSB_FIRST
RT_STRING 0x014d4a60 0x00000580 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_STRING 0x014d4a60 0x00000580 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_STRING 0x014d4a60 0x00000580 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x014d42c8 0x00000030 LANG_PORTUGUESE SUBLANG_PORTUGUESE_BRAZILIAN data
RT_VERSION 0x014d42f8 0x00000230 LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library KERNEL32.dll:
0x401000 GetComputerNameA
0x401008 GetLocaleInfoA
0x401014 ConnectNamedPipe
0x401018 GetModuleHandleW
0x40101c GetCurrentThread
0x401020 ReadConsoleOutputA
0x401024 GetDateFormatA
0x401028 CreateActCtxW
0x40102c LoadLibraryW
0x401030 SetCommConfig
0x401034 ReadConsoleInputA
0x401038 TransactNamedPipe
0x40103c GetNamedPipeInfo
0x401040 DisconnectNamedPipe
0x401044 GetConsoleAliasesW
0x401048 GetProfileIntA
0x40104c GetLastError
0x401050 SetLastError
0x401054 GetProcAddress
0x401058 VirtualAlloc
0x40105c HeapSize
0x401060 SearchPathA
0x401064 LoadLibraryA
0x401068 SetFileApisToANSI
0x40106c FoldStringW
0x401070 EnumResourceTypesW
0x401074 GetOEMCP
0x401078 HeapSetInformation
0x40107c UpdateResourceW
0x401084 Module32Next
0x401088 TlsAlloc
0x40108c WriteConsoleW
0x401090 GetConsoleOutputCP
0x401094 WriteConsoleA
0x401098 ReadFile
0x4010a0 Sleep
0x4010b4 HeapFree
0x4010b8 TerminateProcess
0x4010bc GetCurrentProcess
0x4010c8 IsDebuggerPresent
0x4010cc MultiByteToWideChar
0x4010d0 ExitProcess
0x4010d4 GetStartupInfoW
0x4010d8 RtlUnwind
0x4010dc RaiseException
0x4010e0 LCMapStringA
0x4010e4 WideCharToMultiByte
0x4010e8 LCMapStringW
0x4010ec GetCPInfo
0x4010f0 HeapAlloc
0x4010f4 HeapCreate
0x4010f8 VirtualFree
0x4010fc HeapReAlloc
0x401100 TlsGetValue
0x401104 TlsSetValue
0x401108 TlsFree
0x40110c GetCurrentThreadId
0x401110 GetACP
0x401114 IsValidCodePage
0x401118 WriteFile
0x40111c GetStdHandle
0x401120 GetModuleFileNameA
0x401128 GetModuleFileNameW
0x401134 GetCommandLineW
0x401138 SetHandleCount
0x40113c GetFileType
0x401140 GetStartupInfoA
0x401148 GetTickCount
0x40114c GetCurrentProcessId
0x401154 GetStringTypeA
0x401158 GetStringTypeW
0x40115c CloseHandle
0x401160 CreateFileA
0x401164 GetModuleHandleA
0x401168 GetConsoleCP
0x40116c GetConsoleMode
0x401170 FlushFileBuffers
0x401174 SetFilePointer
0x401178 SetStdHandle
0x40117c SetEndOfFile
0x401180 GetProcessHeap
Library USER32.dll:
0x401188 LoadMenuA
0x401190 CharLowerBuffA
0x401194 CharToOemBuffW
0x401198 CharUpperBuffW

!This program cannot be run in DOS mode.
`.data
@.reloc
bad allocation
Unknown exception
CorExitProcess
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
(null)
`h````
xpxxxx
UTF-16LE
UNICODE
RUUUUU
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
?uZEeu
?uZEeu
?UUUUUU
?UUUUUU
bad exception
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
`h`hhh
xppwpp
i^^?(>
Y:/(A6>
GAIsProcessorFeaturePresent
KERNEL32
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
?_nextafter
_hypot
1#QNAN
1#SNAN
CONOUT$
bad allocation
neyaliheyehebatodebapifocep
RSDSU_
C:\mojogoxal\vipexuhoz\yumodosebiy88\zoyizusuwax\sub87\lawivi1.pdb
jlXjmf
SSSSSS
/SVWuE3
VVVVVVV
u'VVVVVV
0WWWWW
jXhx'E
QQSVWd
t"SS9]
0SSSSS
r=XFE
HHtXHHt
>If90t
<at9<rt,<wt
URPQQh
0A@@Ju
j hp)E
f-00f=
>=Yt1j
QQSVWh
j@j ^V
HtHu4j
s[S;7|G;w
tR99u2
v$;54OE
0SSSSS
PPPPPPPP
0SSSSS
PPPPPPPP
t+WWVPV
tRHtCHt4Ht%HtFHHt
^SSSSS
j"^SSSSS
tGHt.Ht&
^SSSSS
8VVVVV
;t$,v-
UQPXY]Y[
tNIt?It0It
_VVVVV
^WWWWW
0WWWWW
AAFFf;
0SSSSS
_VVVVV
<+t(<-t$:
+t HHt
xr^1VR
-YR'cu<
UKmjR1
&!`%FG
}k?[`Af
nvT7T^f
8]WJa;
&k[$PV
'gEW5)"
t|~!I,Jr]
2t>z{cc
KWxk:
OYjtxE
Nx`lU0
8u,GRZ
Qs98j<"73R
PQ`?J>
S,]f3)
8*/`gAME
l)n=h@,
OOw<jg
VjXhd#
-lB<U(
\P;EYthl
s2U+Eb
NVhu@*|
oF6,S*|?
1M:BQTQ
'%*\df|d
Kvw[B~v
#\wc_{
+-E(&<A
@*t~g[
i4k{bt
K?|3x|
7Eo%)^=Y
R.:aDM
U%,`/,
nW+4-a
jPm_j=s
1r-Q-e
x"]hG)T
K:-LYo
X\RJ>[
]'Rz(-
sE,0L&
^UI${$
yLJ$1.
'BL0};{x
T]A=^b,
3_;]U@
5GfR6
'W.>xYa
^L.i.r
T(Dh*
*ANL5~
@!5A1r
7.-Y3|
,3i?h*
yjtKW]
MrKeSOJ
:<ZBo9WZ"O
7FQ@a'J
X_6(bP
;*yp@p
N|t9:+
e#<+[M
oTNarG
MTn3{>
o/3[Wp!
~z@tT6
hASFG[
?'c&kpWr;sK
S|D1>u
O}#1lh
oKrV6:
U^|_v%H{
qat}&`
v+cGz.
*@}R~a
5~ETgu
~7UyN+(Z
ejqj}l
w+qoAa
%s)%7&
.["HhS
~T7$^v@
q,zw3<;
~t;h0Z
WTZI0n
zs _r2
kT62+m
*w\Ga0
+H[p?P
'_X=:~
O6+[R]
7M.GR`
oR%{C<
1}YGNR
o2LR@g
^+J434>
!Z]izY3
d\n6&$
n]zK%D>m
ce,Z_c
F8jk?I[
@{"0gE
HlJ~z;fm
fO6)fB
r6:E{Gnh
d,[5Vi
yv3;[
1 K^!{spA
z}+y2<i
D=znq<
NY&VK
YLB)PH`
8$aK!U
^7{O}E
."(u"p
lja+\
|3{ppJI
g[|cAo
\;!LsL
SYlP=Lv
d5.0m=}
xcJRjz;
Sz\x;}
UWZ{|A
0Xd+'!0
BXlS;m
@vW^;-
~c-IhF
sL2U>!
B<|oj"
)_=1TX)
+3.avI
D2Zp2rd[
cy_euy
?D@X]%T
1/,XOE
K`@w,q
&^2-(=y
W 'X4q
RnV)Pp
nN+k]-#
oUy9V{
q}sU@r
*RVFY*
Ku=K~%4~
W#6B@>
Oja$w
mm^6yUV
;P5>dH
vs4HWxn
'(K}W
4FX$ye
/-VQM]C
;k0Yb>
9alm1=X
,:+Fw)
Dd{hb9xo
ULlOD9
}3lxve
XAS~p#
[y7)ZY
-3+vQ
|%@)Bs
Fx{*d,
A9'h[Fa|
d|g~N$
7Es0Bc
{56_VeO
`(m]r*J
D$eK;l
lHF>`,/aG
w;D>IH
fw_qjbM
rAzZ~t
bpe5jMF
F(^#@J8i
&>AOpq
v?}c9sMH
%e:Q`*
%WS5Ue
;L ,>T0
-.y"Zm%B
'8\[47g
X(<dh(
}>"VMA6?K
PI6H:x
UqY#Wq
&~:`]b
'z$ZUho
D%K6in
cZWu\
sxCSa7
saOJ.TA#
"2;7V9
L %D,^.
n>FS>C
2n(\f8To
&v&/#E
9>kJmU
vvSIgx
Zh%^Q9
p;N4cM
Dcs.9./
3hI}hIx*\
Z.A]no1
/A%|nn$
-(P,. l
4)'u&2
j7|"p+ou
@_fOac
-3{u&(v
`Y0Cx~7
g)vnCS
L'N^,7^
sapfs|=
)+O.*+
!C>--=
#2k|9g
fjz(na
OBY((K
K"(~D1p
tHN2pU+
!;JN;7G
N+gXI[
>0nos)}
@U<u}B
On]:u8
Mr7x4U
6`ScT
Gj<g"c9CsT
jZBi`@
guRx0Iy+b
xZ4yoh
dH'>o<XYM-
]!,xig:
)q$e{n
gzCSJ+
pcW4}C
yn2X/5&G
zRjS*10
@Y C\n
u~q{R#
Bk]4CV
&\U.<'
iawz(JB
j%%`sf
$$GTHB
zL{*$Xj);ZO
VHo{IU
{RcL1D#
}Z.SB8)
<2.- 0Pd
qA\00M
L)DYBU
zE076dd8
Mbp+?LZ
T7-ux_
~Y,YlL
"}@=vM
.*J<PJ
A`FOs2",
zl0F"
RI{x DN
Kp2[wz
DdH7 5
L[9a6j2
q~EkM,z
31X2Rt
x$\`2y
5P!"'v
]&Xi``
?.4=%w(
|_eT2|
OM@N@R{
a}<m|A
pqexG[
(hmSZ
nO!ruc
4,[zzo
ynDk;;
ai9MJdz
fF)-cN
q)Ii;|
Q,7.QH
N9N&*
=!aZ~b
GRf9_nA
'3pRwC
D}ya`sE
9z\- S
\pxM&0
6PO\'s
Q=Z'B\
H5kI(W_
k}vdH.+
3]!f%@'
`(b~54
jq5(zy
h`TDx0
RIjV<wx
<qSwi(
Y`_W]q
NAp*m<
%r>eY{8
>v(p#;Ay
$+7(hRk
b1w@C+E
S)8.>U
xB[1# K
3gf}.6
O/yj 
'$p'Vz
rA.z(O
4f*Zm{
0qZOWf,
C n%!99
>B.'v0
] 0tQC(!
sw$NB1
A~C{fG;c3
D8BY?<
Ue~eP\
Rmmy;`
<p7y4~%
=irPX
_aG$TMa
TLXO0G
D_jp4J
G,eoB~:
a?n+-u"
L"VB=
[m\e1J
E uY0Rv
$rgQY;v
13;P2F
37%_@l
iib}fi
qWAh[f
'QcoqT
6~exD7
83x5QB`
^{U7*`
T=G3;$
Q]fid%
NCC3\3
M8OU0b
Fw].n5 s:
dCMd$w
'qc~94>
>}] l!
'@@}AX24
jUz#j%
!o:a^'
#|4;|3
m&cf`]
Z:!i;k
|Lh9"A
qe?PSL
M7@2F)
_ICz!=
ICM7hH
jw ;#y
:H}h&N
Zi*WXK
,X <j_~n
&|}3!
=<`NSh&K
@}cyWYy
`Q]2 G_
RLu5w^_h
BBTH;r
$118~2
Ix06K
>lVX[w\N
@FAUvg
xrttSN[
FXxr_
iS9Fl
F/N}J
+1_Snue
0BPoU>
%euGXq
\R<aNB
,+F]$_?
M4r2Sg
+)O|-i
~-kJ k
Dr9M-dM
(j`2GG
dOhAcm
Iop}S;
y>Qc=l
@A] ?
6<J?TV{_
QB}/Vu*
!!5p`;6
#8{7^}X#qWrO
V:)]h;!K
PtV d>
Q7Qs-.
3<'Y|(
#d]hV5
wZg{Cm
ux#klg6`F
4606dh
ZvjG/c
dp88U{
KbZcyP)
R|(]uHJ
M}s)4B/
9ZQ0tn}
6H"i!T
?A9k3S_
h%'_qaI
|e&H9
(9y:.2>
0]@:LZ0
/w-O%|
Z1hpbz~
42B\2:D
:&CK"Cb
0H;E0A
zp64O{
GetComputerNameA
FillConsoleOutputCharacterA
GetLocaleInfoA
InterlockedDecrement
InterlockedCompareExchange
ConnectNamedPipe
GetModuleHandleW
GetCurrentThread
ReadConsoleOutputA
GetDateFormatA
CreateActCtxW
LoadLibraryW
SetCommConfig
ReadConsoleInputA
TransactNamedPipe
GetNamedPipeInfo
DisconnectNamedPipe
GetConsoleAliasesW
GetProfileIntA
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
HeapSize
SearchPathA
LoadLibraryA
SetFileApisToANSI
FoldStringW
EnumResourceTypesW
GetOEMCP
HeapSetInformation
UpdateResourceW
CancelTimerQueueTimer
Module32Next
TlsAlloc
KERNEL32.dll
CharToOemBuffW
CharLowerBuffA
CreateAcceleratorTableA
LoadMenuA
CharUpperBuffW
USER32.dll
InterlockedIncrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
MultiByteToWideChar
ExitProcess
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
GetACP
IsValidCodePage
WriteFile
GetStdHandle
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
CloseHandle
CreateFileA
GetModuleHandleA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
SetStdHandle
SetEndOfFile
GetProcessHeap
ReadFile
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
Copyright (c) 1992-2004 by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
.?AVtype_info@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVbad_exception@std@@
.?AVexception@std@@
.?AVbad_alloc@std@@
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,
|,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,2
"E.Rxd
,,,,,,,,,,,,,,8
,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,
,,,,,,,,,,,
,,,,,,,,,,
GZ,,,,,,,,,,S
,,,,,,,,,,,,
7,,,,,,,,,,,,
h,,,,,,,,,,,,,
S,,,,,,,,,,,,Sak,,,
,,,,,,,,,,,,Sa,,,,,
,,,,,,,,,,,,,,,,,,
K,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
{~z}}~
||{{}|~
{}|{{|
|~~{~}
}z||{}
~~~zy{{}
~{~~~~
~|~~{|}
{z~{}~
~}~{|{
|}|}}~
1024282@2D2H2`2d2
X=\=`=d=h=l=p=t=x=|=
> >$>(>,>0>4>8><>@>D>H>L>P>T>X>\>`>d>h>l>p>t>x>|>
2(2,20282P2`2d2l2
44(414:4C4L4R4X4^4
5"5/5@5Y5t5
6#60686A6c6l6
7$7*7/7>7J7S7`7n7v7
8 8A8T8`8i8o8
9,9K9P9
<f=n=v=
>2>B>R>b>t>
3$3?3F3^3
3-484E4
4R5Z5o5z5
7%7G7]7o7
8>9F9Y9d9i9y9
;)<7<I<T<
=0=U=i={=
1E2]2b2
4$5I5x5
7N8e8v8
9 9,969>9I9y9
;b<:=F=
>->S>q>x>|>
>V?a?|?
0 0$0(0,000z0
1;1D1P1
1282?2G2L2P2T2}2
2.34383<3@3
4+4]4d4h4l4p4t4x4|4
425N5q5
6H7M7[7h7o7y7
9_;m;s;
<)</<:<?<G<M<W<^<r<y<
5$5<5T5
606v6|6
8A9Q9]9o9
;$;+;?;F;m;s;~;
<!</<5<A<G<T<^<e<}<
<>=D=n=t=
=H>k>u>
?!?&?.?4?;?A?H?N?V?]?b?j?s?
00,0L0R0n0
131E1S1h1r1
525}8m9
:&;K;.=*?.?2?6?:?>?B?F?S?
282C2y2
3a3m3y4
7 7*787A7K7
7%8Z8m8
9B:N:a:s:
;=;f;w;
<"<6<@<^<j<v<
= =T=^=f=
>D>S>[>a>x>~>
11k1l2|2
363;3/4f4~4
535X5}5
6&6+6P6
77=7Q7W7
8B8M8n8
:5;>;D;
<:<[<h<
-191?1D1J1
2$2+2?2`2f2
273A3i3
:3<K?r?
33'3/3;3D3I3O3Y3b3m3y3~3
0$0H0k0
282U2i2t2
253)4?5`5l5
>$>@>R>e>w>
2<2Y2d2{2
:D:t:}:
;&;A;H;Q;Z;c;l;u;
4Q5"7+7W7]7f7m7
8,818;8I8
G0Y0k0
3<3,4U4
:';4;M;k;
?4?G?X?}?
1'1U1c1l1
1 2-2U2
6p7z7.8=8
<"<B<n<C=
1X6f6n6{6
2c336J6
557;7@7F7M7_7{7
"646F6X6m6w6
707P7p7
888X8d8
9$9(9D9H9d9h9
:,:0:@:d:p:x:
;(;H;h;
<0<P<p<
=$=,=4=@=`=l=
<(<8<H<l<x<|<
=$=,=4=<=D=L=T=\=d=l=t=|=
= >$>P>T>X>\>`>d>h>l>p>t>x>|>
? ?$?(?,?0?4?@?
1"1&1*1.12161:1>1B1F1J1N1R1V1Z1^1b1f1j1n1r1v1z1~1
2$2,242<2D2L2T2\2d2l2t2|2
mscoree.dll
((((( H
h(((( H
H
KERNEL32.DLL
(null)
kernel32.dll
kernel32.dll
VS_VERSION_INFO
StringFileInfo
042831F2
FileDescription
ElecticStone
LegalCopyright
Copyright (C) 2023, histsric
ProductsVersion
58.18.52.68
ProductName
ProductionVersion
4.90.79.94
VarFileInfo
Translation
Vonufiwudoyun vivuzek
Jiridati faf kiw durifoveyonuporQJewodocuzeyideg dijicuwep wivezu rimowejibefim fuseniputohe wiritodugeg tivokopug
Yehotuhuceg)Guguripa zonef sirozefiducij robinewafoci
Xebikubaxakari
8Zibego sihuwadiyun jobex teyoroto bewu luforuherigup lew>Lehuhiyuxitewam jasexarisoyeg xurim varobehani nepegoregunagezGMuw gizokapoge sina pahoketuxilu powikeh mejufego wepocazetugan nuwerun
:Mumib mafagupagej wimi luhemisarof xipekuca zetegokuwunilo
Rojotifipiyoh kadegejufiwis
Zoti nabo ketik tewam
Fabi veyozes pox wagenucibubSonofoxi doxuzekeg cevupupoyad yehagip poluratilev mijunofabirosi gozayesuzow cimepuwise kafagiral
Pemaferevazega
jWukega dejadonisima gamaruhava ludisefofibupom vatopehetecuhik sexetojesakazev barekosu yekovuk pocifanaya+Ginofadiduxiy bigifa kiz mukunaji refezamat
NewimutacileposCLahakujotaku kok rugolu cec hoxil xejacoy mikajakoce buyorayabuhavoNHeyudawetagonap fic cizajemosudozi gegaxetiyawaku jomulip ret hemeyoka zol fuj
Benagigurenumu:Nicajub hoduranerub fejigefesahu vodeneyin rami xumusayaxu*Bumi xusitovofayewod bucifacomahedic tojih.Widin cac pivorugefeme lofevoteli jekufizupaba
BepasumogCHejerefaki viyoyubavupu lunevuguv yitasafuxuhoj kediniva wipumezeyu
Peyigububewiyom jozaropugvTavojulifo zudufihuronut lafucimalik wadudifevikic darawikokazetu tahogebiwodune wufo catolobulosu xehocazeruwu tiyoji
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Clean
tehtris Generic.Malware
MicroWorld-eScan Clean
ClamAV Win.Packer.pkr_ce1a-9980177-0
CMC Clean
CAT-QuickHeal Ransom.Stop.P5
ALYac Clean
Cylance unsafe
Zillya Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 0056f9be1 )
BitDefender Clean
K7GW Trojan ( 0056f9be1 )
Cybereason malicious.ef3bf5
BitDefenderTheta Clean
VirIT Clean
Cyren Clean
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 Clean
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky VHO:Trojan-Spy.Win32.Stealer.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Trojan.Kryptik!1.B663 (CLASSIC)
Sophos Troj/Krypt-VK
Baidu Clean
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Lockbit.gc
Trapmine malicious.high.ml.score
FireEye Generic.mg.55cf389c5f0d6cd7
Emsisoft Clean
Ikarus Worm.Win32.Dorkbot
GData Clean
Jiangmin Clean
Webroot Clean
Avira Clean
MAX Clean
Antiy-AVL Clean
Gridinsoft Ransom.Win32.STOP.bot!n
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm VHO:Trojan-Spy.Win32.Stealer.gen
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Google Detected
AhnLab-V3 Clean
Acronis suspicious
McAfee Clean
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Malware-Cryptor.Grygoryi.3
Malwarebytes MachineLearning/Anomalous.94%
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Trojan.Win32.Obfuscated.gen
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/GenKryptik.ERHN!tr
AVG Win32:BotX-gen [Trj]
Avast Win32:BotX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (D)
No IRMA results available.