Static | ZeroBOX

PE Compile Time

2022-06-12 13:35:34

PDB Path

C:\mapimiw ledetiy.pdb

PE Imphash

2ecd68902b681b798a1768b60fb38fc6

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00024b06 0x00024c00 7.57720359149
.data 0x00026000 0x01fd3f4c 0x00001c00 2.0367178562
.rsrc 0x01ffa000 0x00013ec8 0x00014000 4.02917283967
.reloc 0x0200e000 0x00009288 0x00009400 0.983962752231

Resources

Name Offset Size Language Sub-language File type
RT_CURSOR 0x0200d0f0 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d0f0 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d0f0 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d0f0 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d0f0 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d0f0 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d0f0 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d0f0 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d0f0 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d0f0 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d0f0 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d0f0 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d0f0 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d0f0 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d0f0 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d0f0 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x020057c0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x020057c0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x020057c0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x020057c0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x020057c0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x020057c0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x020057c0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x020057c0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x020057c0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x020057c0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x020057c0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_STRING 0x0200d998 0x00000530 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x0200d998 0x00000530 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_CURSOR 0x0200d658 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_CURSOR 0x0200d658 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_CURSOR 0x0200d658 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_CURSOR 0x0200d658 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_CURSOR 0x0200d658 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_CURSOR 0x0200d658 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x02005c28 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x02005c28 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x02005c28 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x0200d688 0x00000268 LANG_ENGLISH SUBLANG_ENGLISH_US MS Windows COFF Motorola 68000 object file

Imports

Library KERNEL32.dll:
0x401018 HeapAlloc
0x40101c EndUpdateResourceW
0x401020 GetConsoleAliasA
0x401030 GetTickCount
0x401038 ReadConsoleInputA
0x40103c FreeConsole
0x401040 GetFileAttributesA
0x401048 RaiseException
0x40104c GetShortPathNameA
0x401050 FindFirstFileA
0x401054 GetLastError
0x401060 GetProcAddress
0x401064 VirtualAlloc
0x401068 GetTempFileNameA
0x40106c SetEndOfFile
0x401070 CreateFileMappingW
0x401074 CreateHardLinkW
0x401078 SetFileApisToANSI
0x40107c FoldStringA
0x401080 GetModuleHandleA
0x40108c EnumResourceNamesA
0x401090 SetCalendarInfoA
0x401094 FindFirstVolumeA
0x40109c AddConsoleAliasA
0x4010a0 CloseHandle
0x4010a4 WriteConsoleW
0x4010a8 GetConsoleOutputCP
0x4010ac WriteConsoleA
0x4010b0 PeekNamedPipe
0x4010b4 CreateFileA
0x4010b8 FindResourceA
0x4010bc GetDateFormatW
0x4010c0 LoadLibraryA
0x4010c4 LCMapStringW
0x4010cc Sleep
0x4010e0 TerminateProcess
0x4010e4 GetCurrentProcess
0x4010f0 IsDebuggerPresent
0x4010f4 GetStartupInfoW
0x4010f8 RtlUnwind
0x4010fc HeapFree
0x401100 GetModuleHandleW
0x401104 TlsGetValue
0x401108 TlsAlloc
0x40110c TlsSetValue
0x401110 TlsFree
0x401114 SetLastError
0x401118 GetCurrentThreadId
0x40111c MultiByteToWideChar
0x401120 ReadFile
0x401124 SetHandleCount
0x401128 GetStdHandle
0x40112c GetFileType
0x401130 GetStartupInfoA
0x401134 SetFilePointer
0x401138 ExitProcess
0x40113c WriteFile
0x401140 GetModuleFileNameA
0x401144 GetModuleFileNameW
0x40114c GetCommandLineW
0x401150 HeapCreate
0x401154 VirtualFree
0x40115c GetCurrentProcessId
0x401164 HeapSize
0x401168 HeapReAlloc
0x40116c GetCPInfo
0x401170 GetACP
0x401174 GetOEMCP
0x401178 IsValidCodePage
0x40117c GetLocaleInfoA
0x401180 GetStringTypeA
0x401184 GetStringTypeW
0x401188 SetStdHandle
0x40118c WideCharToMultiByte
0x401190 GetConsoleCP
0x401194 GetConsoleMode
0x40119c FlushFileBuffers
0x4011a0 LCMapStringA
Library USER32.dll:
0x4011a8 CharToOemBuffW
0x4011ac GetMessageExtraInfo
0x4011b0 ChangeMenuA
0x4011b4 GetIconInfo
0x4011b8 CharUpperBuffA
0x4011bc LoadMenuW
Library GDI32.dll:
0x401010 GetPolyFillMode
Library ADVAPI32.dll:
0x401004 ReadEventLogA
Library ole32.dll:
0x4011c4 CoGetPSClsid

!This program cannot be run in DOS mode.
`vRich
`.data
@.reloc
bad allocation
string too long
invalid string position
Unknown exception
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
CorExitProcess
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
bad exception
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
CONOUT$
bad allocation
gusoluwurijekese
xikotuzazilug logac wavukejodukixuzeyemewocozoz
jojuxaharucuzoyazuhobeto nizawaxagefawayagevopekekoze giraf
lahegabubelacalalihabovijuyove def pav
motinusanasifoliz labeyizecixisahaherisut vuhovuna tayijebi tahecugiwikoguwekizunexepajovuy
wahagoxiraligusure jejafexagin yuhutuyij
jipifudepezuvujezoyutahor kow nukitedodatawecobosivicexin zipiseyefuripinenoraberigaf petexezixucifeyiho
doguditavakumapovifobetolasutihe
paguwazenidepolulozugogefazojini semokoxozepuwoselepasexov
ximirohisaxikavibasuwesuc
hacovucekucayitego
kernel32.dll
eveyowet
rigegunawobojigad susisaje kucopulofi gapalaxedohokup sagoxovabetu
xuvufuzegamanekarani kowojexavufabamedubakokoliw putujacexujaloxihik wuxicakusanicijox
vector<T> too long
C:\mapimiw ledetiy.pdb
PVh ,@
VVVVVVV
VVhl-@
PVVhX.@
VVVVVVV
VVVVVVV
WWWWWW
D$PPWW
WWWWWW
0WWWWW
0WWWWW
QQSVWd
to=HjB
0SSSSS
Y;=xiB
j@j ^V
>=Yt1j
QQSVWh
j,h8JB
HtHu4j
s[S;7|G;w
tR99u2
v$;5ljB
0A@@Ju
0SSSSS
PPPPPPPP
0SSSSS
PPPPPPPP
URPQQh8
0WWWWW
AAFFf;
;t$,v-
UQPXY]Y[
t"SS9]
t+WWVPV
Y4)ZNs
4]l?[-3
Ljb, D
<2mI9?
dROylF
@|!XB2
PYF>PL
~@wdc"
$NL^pgQ(
<3K_Rx
F!3'?X
7anq*Y
"wA+[
::0}Hkh
>z#;'9
g@M>mr
r$0.'V,bR
AO1H4P
}f&j3t=#
Z|qr=8 !f
EtV{NR
<rmFZH
BLCiVP )
p|'<U]+
p|'<U]+
p|'<U]+
W6'OgH"W
hdb '9
yH?Dkn
oZiqIf
K#9~x@e
Vxd-Q#-
*z&vmL
@Sp`jU
A]( .NI
Kf0v.#!
`?BvMl
f/8doJ
@Dt.N,
+]^<@}#
z.7i]x_
v!RB|<
B%lxCo
/}tYXMv
$0EP9T$U
>_84eQ
=7sxUBI
SZVE7<
mcE>$^l
[a:"P%
.:n5SN
OEf0F=Q
m\/X1U
K?N463
x[FQQl
A}p2=O
};O{0Z(b
nA4w/q
9H$r\#r
z/$JFI6
3?p(}c
-47~}1EP
X,~Cfw
Y[+%MK$
=sCZz-Rj
N+;dCG0@
zlGwZ@
WzUWgw(
ac5?%z
v(?B}.
SrF2wM
wt!-@X
qMxscY
ME{u}x
/;m>|&D
4TZ"G#k
=ib!Ka
C:6s:Ja+
u[2h&B
a&m2oR.
O!@?pv
$Qthsa
|8jQIt
-<bl\|rID
7e}]vd)2
uu$c#;
1rf84K
g=Kd=>b
;Nz~(1
AJTQWx
9Ho4Pp*
_"7W?%b
6-\tm8N
>RW"~8
Zt(=>}
(c{/MW[
@i`*8
,3Vp%i`%
P->j^L
WMjk3+V
rZ:5dG
TIe;PuO
"}kGvC
)l3P~i*
n#,.F_Z
$!}G3r
nP] r(c\
+K _U:
WnV~F}
q:da6lW
Z{@CKH
cK"AFI
Ny`VYQ*
|}m4M
A~0=(}
<KWAp@
.)@dCi
tzs{KD
0EEnN6
A<Mrl;
0BzsS9
*jX6/*
\/lQwn
4&Q-jB
WwF62h
`c9z,<
)y0#V\
^L[f*>:>
WPlR=
7l 9C5
:375o:
4m%'`M,
Oxzx4y
l>[x(F
|B -7TY[
51q,r2
zavJ3)C
\Y%[*-C:
QxLUv<
GetDateFormatW
CreateFileA
FindResourceA
PeekNamedPipe
SetEndOfFile
HeapAlloc
EndUpdateResourceW
GetConsoleAliasA
InterlockedDecrement
GetSystemWindowsDirectoryW
InterlockedCompareExchange
GetTickCount
GetConsoleAliasesLengthA
ReadConsoleInputA
FreeConsole
GetFileAttributesA
FileTimeToSystemTime
RaiseException
GetShortPathNameA
FindFirstFileA
GetLastError
InterlockedFlushSList
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
GetTempFileNameA
LoadLibraryA
CreateFileMappingW
CreateHardLinkW
SetFileApisToANSI
FoldStringA
GetModuleHandleA
FindFirstChangeNotificationA
FreeEnvironmentStringsW
EnumResourceNamesA
SetCalendarInfoA
FindFirstVolumeA
EnumResourceLanguagesW
AddConsoleAliasA
KERNEL32.dll
CharToOemBuffW
LoadMenuW
CharUpperBuffA
GetIconInfo
ChangeMenuA
GetMessageExtraInfo
USER32.dll
GetCharacterPlacementA
GetPolyFillMode
GDI32.dll
GetPrivateObjectSecurity
ReadEventLogA
ADVAPI32.dll
CoGetPSClsid
ole32.dll
InterlockedIncrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
HeapFree
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
MultiByteToWideChar
ReadFile
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
ExitProcess
WriteFile
GetModuleFileNameA
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
FlushFileBuffers
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CloseHandle
.?AVout_of_range@std@@
.?AVfacet@locale@std@@
.?AV_Locimp@locale@std@@
Copyright (c) 1992-2004 by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
.?AVtype_info@@
.?AVbad_exception@std@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AV?$basic_stringbuf@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@
.?AV?$basic_streambuf@DU?$char_traits@D@std@@@std@@
.?AVexception@std@@
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVbad_alloc@std@@
llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllvVV
ullllllllllllllllllllllllllllllllllllll
6nllllllllllllllllllllllllllllllllllll
0lllllllllllllllllllllllllllllllll
lllllllllllllllllllllllllllllll
Tllllllllllllllllllllllllllllll-
.lllllllllllllllllllllllllllll
,.lllllllllllllllllllllllllllll
,.lllllllllllllllllllllllllllll
Hillllllllllllllllllllllllllllll
llllllllllllllllllllllllllllll
nlllllllllllllllllllllllllllllll0T
nlllllllllllllllllllllllllllllllll.
lllllllllllllllllllllllllllllllllllllllll
lllllllllllllllllllllllllllllllllllllllll
Tlllllllllllllllllllllllllllllllllllllllll
Tlllllllllllllllllllllllllllllllllllllllll
jllllllllllv60llllllllllllllllllllllllllll
llllllllll
nllllllllllllllllllllllllllll
llllllllln_
nllllllllllllllllllllllllllll
lllllll
nllllllllllllllllllllllllllll-
llllUvT
nllllllllllllllllllllllllllll-
llllllllllllllllllllllllllll
ullllllllllllllllllllllllllll-
lllllllllllllllllllllllllllll-
lllllllllllllllllllllllllllll
llllllllllllllllllllllllllllll
Ollllllllllllllllllllllllllllll
jlllllllllllllllllllllllllllllll
-jllllllllllllllllllllllllllllllllljl7
llllllllllllllllllllllllllllllllllllll
llllllllllllllllllllllllllllllllllllllllj+
#*.llllllllllllllllllllllllllllllllllllllll
.llllllllllllllllllllllllllllllllllllllllll
h*.llllllllllllllllllllllllllllllllllllllllllll
.llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
;;;;;;;;;;;;;;;;;;;;;;;;;
];;;;;;;;;;;;;;;;;;;;;;;;
;;;;;;;;;;;;;;;;;;;;;
V;;;;;;;;;;;;;;;;;;;k
;;;;;;;;;;;;;;;;;;;O
hy;;;;;;;;;;;;;;;;;;
<rfB%;;;;;;;;;;;;;;;;;;;
;;;;;;;;;;;;;;;;;;;
;;;;;;;;;;;;;;;;;;;;;
+Y;;;;;;;;;;;;;;;;;;;;;;;;;;;;
;;;;;;;;;;;;;;;;;;;;;;;;;;;;
;;;;;;;;;;;;;;;;;;;;;;;;;;;;!/
W;;;;;;;;
2;;;;;;;;;;;;;;;;;;l
;;;;;;;
;;;;;;;;;;;;;;;;;;L$
;;;;;;
;;;;;;;;;;;;;;;;;;~|?
;;;;;;;;;;;;;;;;;;
;;;;;;;;;;;;;;;;;;
;;;;;;;;;;;;;;;;;;;`
;;;;;;;;;;;;;;;;;;;\9z
4.;;;;;;;;;;;;;;;;;;;;
8;;;;;;;;;;;;;;;;;;;;;
;;;;;;;;;;;;;;;;;;;;;;^G
pF;;;;;;;;;;;;;;;;;;;;;;;;;Z
;;;;;;;;;;;;;;;;;;;;;;;;;;
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;M
;;;;;;;;;;;;;;;;
{}{{~|
|~~~}z
||y}}|
{|}z{~{
~{|y{~
{}~}z{~
|{}||~~~|
{}}|~{~
~||||{
{~~}{{|
}~~{}~z
}z|}{{{
~|{{{}
|z|{|~
~}{~z~{}
{~}~|~
{}}~~~
zz~z~~
~|z~z~
E{<yEP
E{<yEP
iiiiiiii
iiiiiiii
iiiiii
iiiiii
iiiiiiiii
iiiiiiiiii
iiiiiiii
iiiiiii
iiiiiiiii







2P2T2X2\2`2d2h2l2p2t2x2|2
2\:`:d:h:|:
X9\9`9d9h9l9p9t9x9|9
: :$:(:,:0:4:8:<:@:D:H:L:P:T:X:\:`:d:h:l:p:t:x:|:
:`?d?h?l?p?t?x?|?
0 0$0(0,0
1(181<1L1P1T1\1t1
2,202@2D2H2L2T2l2|2
3(3,343L3\3`3p3t3x3
3Q4`4m4w4k5
7"7)70777>7E7L7S7Z7
8!8B8R8]8j8{8
969K9R9n9t9
:J:Q:j:
<5<><E<K<g<l<q<x<
<'=<=H=p=
M0Z0w0
8 8=8[8h8{8
;$;i;v;
5U6[6c6p6
>J?W?f?x?
4!4(4,4044484<4@4D4
5,53585<5@5a5
5*6064686<6
9K9Q9]9
<"=(=3=?=T=[=o=v=
>'>6><>E>Q>_>e>q>w>
?.?n?t?
0/161Q1V1^1d1k1q1x1~1
2)2.2;2I2O2\2|2
;,;3;B;N;[;
<&</<S<
1$1(1,1014181<1@1
8-8G8{8
:$:s:<;
;S<s<x<Q=^=
>.>4>=>D>f>
?%?;?F?`?l?t?
0 0%0C0
1U1m1x1
1"2G2l2
455@5J5[5f5
6X7_7t7
7/848B8Q8t8
9D9M9Y9
9;:A:s:
8 8&8-848;8B8I8P8W8_8g8o8{8
9*9Y9g9
;";,;V;d;j;
? ?&?@?E?T?]?j?u?
0%0,020@0G0L0U0b0h0
5b7m7u7-9?9Q9s9
='=:=^=
0%0>0Z0c0i0r0w0
=*=6=]=j=o=}=
:::I:e:s:y:
>=>C>O>
020?0K0U0]0h0
8:9(:e:o:
414^4y4
5 5=5R5\5f5r5~5
6 6,6L6P6T6\6p6x6
888X8x8
9(949P9p9
: :P:X:\:t:x:
;0;P;p;
<,<0<P<l<p<
=(=0=D=L=P=T=\=d=l=
>0><>\>h>
00040T0x0
3`6p6|6
7$7,7D7H7
9(989\9h9l9p9t9x9
: :$:(:,:0:@:H:L:P:T:X:\:`:d:h:l:x:
x0|001
:4:T:t:
KERNEL32.DLL
mscoree.dll
((((( H
h(((( H
H
funemaconibewamezuhumav
jicabi
kernel32.dll
Vowareko
Juxekatem zahetari
yodopojor
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
VS_VERSION_INFO
StringFileInfo
042831F2
FileDescription
Silver
LegalCopyright
Copyright (C) 2022, Vombat
OriginalFilename
petshop.exe
ProductsVersion
23.50.62.52
ProductName
Huickers
ProductionVersion
77.5.94.62
VarFileInfo
Translation
&Sis rogemi joxone ligi mawerigehi hulo
Yeyaket tafebova ximobudoragac
!Nesijuze pona vusohofevohevek pef
Fib dipiTVulajokoviva fuvoren xatucev bozupiceh jatogokanoxuh nacaral nagux behaz pilumetigigRCipokuwokuge leru mudisijaworamaw bijoruwuxe labesisarakinok jotoyi pojuwowinagadi4Kegenahibenum catem rajunikuzobu malu jacun marorevu
Foyoxideyalu picazCTetekomapuyo bujeyomutilunu xonutuhol pexiranug tayugutej ceruxajij4Wevozutilusixu caloho kuv vivupucixudule cumelim bim
Cizuyutup nunutunasoliho ravus
Yanucebih#Vojow jeweyudanop foxex hanitobowag9Cep zacafihuvina xuyidomojuv bujujakuru jeyunoy sebipayur<Dal pigivov yinubupocumi way rup xuzasikoya zum jecasiwatowa:Netimezana tinevemuzarac zucobamiyibefe jili suyixagapicih
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Adware.Win32.Generic.lXlr
tehtris Generic.Malware
DrWeb Trojan.PWS.Stealer.26952
MicroWorld-eScan Clean
ClamAV Win.Packer.pkr_ce1a-9980177-0
CMC Clean
CAT-QuickHeal Ransom.Stop.P5
ALYac Clean
Malwarebytes Generic.Malware/Suspicious
Zillya Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
Cybereason malicious.2821de
BitDefenderTheta Clean
VirIT Clean
Cyren W32/ABRisk.GHUK-5855
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Kryptik.HUNI
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky UDS:DangerousObject.Multi.Generic
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Trojan.Generic@AI.100 (RDML:kR5Yl0PJyb04JNMoN0kbgQ)
Sophos Troj/Krypt-VK
F-Secure Clean
Baidu Clean
VIPRE Clean
TrendMicro Trojan.Win32.PRIVATELOADER.YXDIEZ
McAfee-GW-Edition BehavesLike.Win32.Generic.dh
Trapmine suspicious.low.ml.score
FireEye Generic.mg.3b17576498da3c20
Emsisoft Clean
Ikarus Trojan-Spy.Agent
GData Clean
Jiangmin Clean
Webroot W32.Trojan.Gen
Avira Clean
MAX Clean
Antiy-AVL Clean
Gridinsoft Malware.Win32.Gen.bot
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
Microsoft Trojan:Win32/SmokeLoader.RG!MTB
Google Detected
AhnLab-V3 Clean
Acronis suspicious
McAfee Artemis!3B17576498DA
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 BScope.Backdoor.RmRAT
Cylance unsafe
Panda Trj/RansomGen.A
Zoner Clean
TrendMicro-HouseCall Trojan.Win32.PRIVATELOADER.YXDIEZ
Tencent Trojan.Win32.Obfuscated.gen
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Clean
Fortinet W32/Kryptik.HFSR!tr
AVG FileRepMalware [Misc]
Avast FileRepMalware [Misc]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.