Static | ZeroBOX

PE Compile Time

2022-10-11 01:41:58

PDB Path

C:\fuxa-pow.pdb

PE Imphash

414866fe1c8512328085560b1dd725b8

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00025e5c 0x00026000 7.55492294812
.data 0x00027000 0x01fd3f4c 0x00001c00 2.04422769539
.rsrc 0x01ffb000 0x000131d8 0x00013200 4.20320518042
.reloc 0x0200f000 0x00009600 0x00009600 0.985052294276

Resources

Name Offset Size Language Sub-language File type
RT_CURSOR 0x0200d3f8 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d3f8 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d3f8 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d3f8 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d3f8 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d3f8 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d3f8 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d3f8 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d3f8 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0200d3f8 0x00000568 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02009460 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02009460 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02009460 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02009460 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02009460 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02009460 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02009460 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02009460 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02009460 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02009460 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02009460 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02009460 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02009460 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02009460 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02009460 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_STRING 0x0200dca8 0x00000530 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x0200dca8 0x00000530 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_CURSOR 0x0200d960 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_CURSOR 0x0200d960 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_CURSOR 0x0200d960 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_CURSOR 0x0200d960 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x02003a60 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x02003a60 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x02003a60 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x0200d990 0x0000026c LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library KERNEL32.dll:
0x401018 PeekNamedPipe
0x40101c SetEndOfFile
0x401020 EndUpdateResourceW
0x401024 GetConsoleAliasA
0x40102c AddConsoleAliasW
0x401030 CreateHardLinkA
0x401034 GetTickCount
0x40103c GetDateFormatA
0x401040 FreeConsole
0x401044 HeapDestroy
0x401048 GetFileAttributesA
0x401050 RaiseException
0x401054 GetShortPathNameA
0x401058 GetLastError
0x40105c GetProcAddress
0x401060 VirtualAlloc
0x401064 LoadLibraryA
0x401068 FindFirstFileW
0x40106c SetCalendarInfoW
0x401070 CreateFileMappingW
0x401074 FoldStringA
0x401078 GetModuleHandleA
0x401084 FindFirstVolumeA
0x401088 ReadConsoleInputW
0x401094 AreFileApisANSI
0x401098 CloseHandle
0x40109c WriteConsoleW
0x4010a0 GetConsoleOutputCP
0x4010a4 WriteConsoleA
0x4010a8 EnumResourceNamesW
0x4010ac CreateFileA
0x4010b0 GetTempFileNameW
0x4010c0 Sleep
0x4010d4 TerminateProcess
0x4010d8 GetCurrentProcess
0x4010e4 IsDebuggerPresent
0x4010e8 GetStartupInfoW
0x4010ec RtlUnwind
0x4010f0 HeapFree
0x4010f4 HeapAlloc
0x4010f8 GetModuleHandleW
0x4010fc TlsGetValue
0x401100 TlsAlloc
0x401104 TlsSetValue
0x401108 TlsFree
0x40110c SetLastError
0x401110 GetCurrentThreadId
0x401114 MultiByteToWideChar
0x401118 ReadFile
0x40111c SetHandleCount
0x401120 GetStdHandle
0x401124 GetFileType
0x401128 GetStartupInfoA
0x40112c SetFilePointer
0x401130 ExitProcess
0x401134 WriteFile
0x401138 GetModuleFileNameA
0x40113c GetModuleFileNameW
0x401144 GetCommandLineW
0x401148 HeapCreate
0x40114c VirtualFree
0x401154 GetCurrentProcessId
0x40115c HeapSize
0x401160 HeapReAlloc
0x401164 GetCPInfo
0x401168 GetACP
0x40116c GetOEMCP
0x401170 IsValidCodePage
0x401174 GetLocaleInfoA
0x401178 GetStringTypeA
0x40117c GetStringTypeW
0x401180 WideCharToMultiByte
0x401184 SetStdHandle
0x401188 GetConsoleCP
0x40118c GetConsoleMode
0x401194 FlushFileBuffers
0x401198 LCMapStringA
0x40119c LCMapStringW
Library USER32.dll:
0x4011a4 GetMessageExtraInfo
0x4011a8 ChangeMenuA
0x4011ac GetIconInfo
0x4011b0 LoadMenuW
0x4011b4 CharToOemBuffW
0x4011b8 CharUpperBuffW
Library GDI32.dll:
0x401010 GetPolyFillMode
Library ADVAPI32.dll:
0x401004 ReadEventLogA

!This program cannot be run in DOS mode.
`.data
@.reloc
bad allocation
string too long
invalid string position
Unknown exception
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
(null)
`h````
xpxxxx
CorExitProcess
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
bad exception
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
`h`hhh
xppwpp
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
CONOUT$
bad allocation
gusoluwurijekese
xikotuzazilug logac wavukejodukixuzeyemewocozoz
jojuxaharucuzoyazuhobeto nizawaxagefawayagevopekekoze giraf
gasatahawecuyozowalayigerekowepogafigohesururadagaxobigodayapenokekalicopacoyihetexojexanesurojazumijaxo
xudejinifacisatuzipukojamiyitujatamubuyokapigajopidegayidu
ximirohisaxikavibasuwesuc
putidujo
zezezijaxixazazocu
hacovucekucayitego
%s %f %c
kernel32.dll
eveyowet
jowexotup
vector<T> too long
C:\fuxa-pow.pdb
VVVVVVV
VVh(/@
VVhl/@
VVVVVVV
VVVVVVV
WWWWWW
D$PPWW
WWWWWW
0WWWWW
0WWWWW
jXhH[B
QQSVWd
to=HzB
0SSSSS
Y;=xyB
HHtXHHt
>If90t
j@j ^V
>=Yt1j
QQSVWh
HtHu4j
s[S;7|G;w
tR99u2
v$;5lzB
0A@@Ju
0SSSSS
PPPPPPPP
0SSSSS
FVh4$@
PPPPPPPP
^SSSSS
j"^SSSSS
URPQQh
0WWWWW
AAFFf;
;t$,v-
UQPXY]Y[
GWh4$@
t"SS9]
t+WWVPV
@8X5/oS
P839h
1j0-n3r
fsib,m
"_C]+c
v$3}wi
_ffX/Rt
rQSS#8
aO{kZX
@N.q8h
LaEKbb
tgi)|3
oOEOjo
=b+x4Q
`kLd"=T
T&OoW,
le:9g<
0~P`4F
xY#{p{'
o^m_b!7}
S}wpY.
F^VIu*
Ia/|)
kn5k~u
[dOI'l
;Q4kGO
~\z~:>
K<!OhA
Jn2_p-
xS7]k9fwA
AMK='5
Ul55W#
0Evh"}W
(wL@h=
k=IIex
_RM]sT1 J
pT9\>>
"}(}_9
tYzx#pgC
8fL<Ct
wQ-h]r68
XI4n5S
X(k`tu
r8<@i7wP
l:+7n
a-qp@6b
PmaBFV
)E26;C
u)J2;<E
1#oIy?
qfazPD6
n!(qG$&
]cMOy
|4B^^]
6xp-$'
!dIeC|
ttNkM#
fC*5Mt
3w^R.2z~
ZYI}"]
rxh8Fc
Ycw'ta!
.Vxr-0
Bg!sdt
+i8)p(
c-<cb\
eIYlaSE@
G)!2q.o
M>#F8"
^Hi^&e
":zC|o
X%fndZ
=`V^.m'
o/Qx^u}
3!~\r_`
cq}1B=
eOUk&g}
S-|cv4
7S(1}G
{?A|x=
UG,C=_
hvYv8{
mB}LML8kX
F'PwdQ"&
LSN@*B
4xfp0"
V[Y(]f
`,X@P/
&&9Kv*
.SNhfV,J
+qTRQ:z
vjpDwk
Gg@L'p
clcO|Y:
0O]gU*`
.FeP`f
TnB|S?
Mr#0C,
B/O_(Qb"
L:]Y@,l
LBBUjH^
*7/}"/
]OTTy
22iXR8
JD$}l(e
;2lC\R?
ia!!\u
{m7=,
lQoLsK
>7B9Gi
V\et{C0
BL#XP6Py
.}8YUs
mj^Paj
}5NitT8
w)H/Nc
1,y'fm5j
$$QmFw
!B$35ka"r
)\np'o
`9|#V\
TNz)1"
-lCJSI
Q>\y.e
H{Cv^u
(J8_,6
.\FDG|
#Z-glM
0(A,sy;BP
l|@?G0
li|7yE
gM{Z't
y=dX!fZ
;Gnz@vV"
a:C=hn
HN#(,<K
@*Obb|
=jf(H
GetTempFileNameW
EnumResourceNamesW
CreateFileA
FindFirstFileW
PeekNamedPipe
SetEndOfFile
EndUpdateResourceW
GetConsoleAliasA
GetSystemWindowsDirectoryW
AddConsoleAliasW
CreateHardLinkA
GetTickCount
GetConsoleAliasesLengthA
GetDateFormatA
FreeConsole
HeapDestroy
GetFileAttributesA
FileTimeToSystemTime
RaiseException
GetShortPathNameA
GetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
InterlockedExchangeAdd
SetCalendarInfoW
CreateFileMappingW
FoldStringA
GetModuleHandleA
FindFirstChangeNotificationA
FreeEnvironmentStringsW
FindFirstVolumeA
ReadConsoleInputW
EnumResourceLanguagesW
ReadConsoleOutputCharacterW
AreFileApisANSI
KERNEL32.dll
CharToOemBuffW
LoadMenuW
GetIconInfo
ChangeMenuA
GetMessageExtraInfo
CharUpperBuffW
USER32.dll
GetCharacterPlacementA
GetPolyFillMode
GDI32.dll
GetPrivateObjectSecurity
ReadEventLogA
ADVAPI32.dll
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
HeapFree
HeapAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
MultiByteToWideChar
ReadFile
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
ExitProcess
WriteFile
GetModuleFileNameA
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
WideCharToMultiByte
SetStdHandle
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
FlushFileBuffers
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CloseHandle
.?AVout_of_range@std@@
.?AVfacet@locale@std@@
.?AV_Locimp@locale@std@@
Copyright (c) 1992-2004 by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
.?AVtype_info@@
.?AVbad_exception@std@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AV?$basic_stringbuf@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@
.?AV?$basic_streambuf@DU?$char_traits@D@std@@@std@@
.?AVexception@std@@
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVbad_alloc@std@@
g{/{{l
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[Gu
:[[[[[[[[[[[[[[[[[[[[[[[[[
[[[[[[[[[[[[[[[[[[[[[[[[
[[[[[[[[[[[[[[[[[[[[[
[[[[[[[[[[[[[[[[[[[
S[[[[[[[[[[[[[[[[[[[
Ue][[[[[[[[[[[[[[[[[[2E
[[[[[[[[[[[[[[[[[[[
[[[[[[[[[[[[[[[[[[[z
[[[[[[[[[[[[[[[[[[[[[@
[[[[[[[[[[[[[[[[[[[[[[[[[[[[o
[[[[[[[[[[[[[[[[[[[[[[[[[[[[
[[[[[[[[[[[[[[[[[[[[[[[[[[[[
[[[[[[[[
q[[[[[[[[[[[[[[[[[[
g[[[[[[[
C>[[[[[[[[[[[[[[[[[[
[[[[[[
[[[[[[[[[[[[[[[[[[
.[[[[;J
8[[[[[[[[[[[[[[[[[[
|[[[[[[[[[[[[[[[[[[$
6[[[[[[[[[[[[[[[[[[[Di
<[[[[[[[[[[[[[[[[[[[
[[[[[[[[[[[[[[[[[[[[
yv7A[[[[[[[[[[[[[[[[[[[[[
[[[[[[[[[[[[[[[[[[[[[[
[[[[[[[[[[[[[[[[[[[[[[[[[
I[[[[[[[[[[[[[[[[[[[[[[[[[[~
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[b0[[[[[[[[[[[[[[[[
|{~}z~
{~~{z~y~|
}}}{}y
z~{~|{{
~|z~~{~|~}{
{{~{}{
~}|z|z~
~{~|z~}
}z||~z~~
{~~~}zyyz
{~yz{~
~~}}}y
|}~|}~{
|~{~}}
{}~{||
{{z{}~
z{~{~}
}~|y||z
}{|{{{
}~~~{}
E{<yEP
'''''''''''''''''''''''''''''''''''''''''''''''''''''''
'''''''''''
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
'''''''''~
'''''''~~
KKK,K,,,,,,,,,,,,,,,,,k
'''''~
##WWWW
ZiibG\\
#####l
99999999eo
I""#"####WWW
x'''''
~''''''
'''''''''
'''''''''
='''''''''
=''''''''''
''''''''''''''''''''''
'''''''''''''''''''''''
""""""
'''''''''''''''''''''''''
'''''''''''''''''''''''''''
'''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
(JJJJJJJ
;;;;;;;;;;w
&!;;;;;;;
;;;;;;;
bbbbIPPP
*;;;;;;
55bbbbPP$
eyssss
bbIIPr
;;;;;;;;;;;QU
P;;;;;;;;
f1JJJJJJ
JJJJJJJ
JJJJJJJJJJJJJJJ
JJJJJJJJJJJJJJJJ
eJJJJJJJJJJJJJJJJJJJJJJJJJJJY
%JJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJ
fffffffffffffff
^^^^^V
#DDDDDDDDDDDDDD#A
f^^fsf
f^^fsf
f^^fsf
f^^f5f
f^^fYfDCC
f^^fYf
f^^fYy
/TTT,Tbf^^fT
^^^fTee~eee~,
^^^^fT
ee~e~-
2fffff^^^^^f
^^^^^^^^^^^
\\\\\\\
^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^]^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
OOOOOOOOOO




2P2T2X2\2`2d2h2l2p2t2x2|2
(:,:0:4:8:<:@:D:H:L:P:T:X:\:`:d:h:l:p:t:x:|:
; ;$;(;,;0;4;8;<;@;D;H;L;P;T;X;\;`;d;h;l;p;t;x;|;
D0H0L0P0T0X0\0`0d0h0l0p0t0x0|0
2$2(282<2@2H2`2p2t2
3,3034383@3X3h3l3|3
4 484H4L4\4`4d4l4
4A5P5]5g5[6|6
8 8'8.858<8C8J8~8
969F9Q9^9o9
:1:F:M:i:o:
;5;<;U;k;r;z;
<m<v<|<
=%=.=J=e=q=
1:2S2{2&6
1,1I1|2
9-9:9M9m9w9
:1;X;a;z;
;;<H<R<W<y<
=;>S>u?
Y0c0p0
4P5W5x5
8.8S8g8y8
1\1b1s1
3!484I4
5(5/575<5@5D5m5
6$6(6,606
7M7T7X7\7`7d7h7l7p7
7"8>8a8t8
?-?3?>?J?_?f?z?
0%0=0L0S0`0
1.141P1h1
2+252m2u2
3"3*333?3D3I3O3S3Y3^3d3i3x3
4.4H4N4h4w4
5(525X5
586J6~7 8>8d8
3\4d4|4
; <O<J=
>!>(>,>0>4>8><>@>D>
?,?3?8?<?@?a?
*0004080<0
9#:C:H:!;.;
=0=<=D=T=i=
>%?=?H?l?u?|?
0<0O0g0y0
0P1V1o1u1
4(5/5D5
6!6D6Q6]6e6m6y6
7)7b7k7w7
8C8P8c8+9Q:J;
485C5n5y5
6 6'6/676?6K6T6Y6_6i6r6}6
6)777~7
7T8]8c8
8&949:9]9d9}9
=$=-=:=E=W=j=u={=
>%>2>8>R>c>i>z>
3_325=5E5
7!7C7U7g7y7
:S:`:j:x:
>*>3>9>B>G>V>}>
C0M0e0l0v0~0
4.7O7[7
99:E:Q;
</<M<a<g<
+060d0r0
::/:4:L:R:a:g:v:|:
4.4g4t4S5b5S6
77)727=7R7Y7_7u7
;";4; <
*7M7p7
8(8:8L8^8p8
9$909:9D9N9Y9]9b9t9
:4:@:`:h:t:
; ;@;\;`;h;l;
<(<4<P<\<x<
= =@=`=h=l=
>$>(>D>H>P>X>`>d>l>
? ?@?\?`?
0 0@0`0
10181<1D1L1|1
282D2d2p2
3$30383P3\3|3
00040T0x0
5`6p6|6
7$7,7D7H7
9(989\9h9l9p9t9x9
: :$:(:,:0:@:H:L:P:T:X:\:`:d:h:l:x:
x0|001
:4:T:t:
KERNEL32.DLL
(null)
mscoree.dll
((((( H
h(((( H
H
fxabapebeleluxagularegejuxelewefakivozo
korikiyazifimukijifusuginucehopuxagadiyutoliwepebepiyohagisohotuhamamidegomivizipikajakamum
funemaconibewamezuhumav
pakadeyucasilesirubucecanelolihileripeva
zuluzeyacakokomogusebubosabacuza
jicabi
kernel32.dll
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
VS_VERSION_INFO
StringFileInfo
042831F2
FileDescription
Silvuple
LegalCopyright
Copyright (C) 2022, Vombat
OriginalFilename
petshop.exe
ProductsVersion
23.50.62.52
ProductName
Huickers
ProductionVersion
77.5.94.62
VarFileInfo
Translation
&Sis rogemi joxone ligi mawerigehi hulo
Yeyaket tafebova ximobudoragac
!Nesijuze pona vusohofevohevek pef
Fib dipiTVulajokoviva fuvoren xatucev bozupiceh jatogokanoxuh nacaral nagux behaz pilumetigigRCipokuwokuge leru mudisijaworamaw bijoruwuxe labesisarakinok jotoyi pojuwowinagadi4Kegenahibenum catem rajunikuzobu malu jacun marorevu
Foyoxideyalu picazCTetekomapuyo bujeyomutilunu xonutuhol pexiranug tayugutej ceruxajij4Wevozutilusixu caloho kuv vivupucixudule cumelim bim
Cizuyutup nunutunasoliho ravus
Yanucebih#Vojow jeweyudanop foxex hanitobowag9Cep zacafihuvina xuyidomojuv bujujakuru jeyunoy sebipayur<Dal pigivov yinubupocumi way rup xuzasikoya zum jecasiwatowa:Netimezana tinevemuzarac zucobamiyibefe jili suyixagapicih
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Clean
Elastic malicious (high confidence)
DrWeb Clean
ClamAV Win.Packer.pkr_ce1a-9980177-0
CMC Clean
CAT-QuickHeal Ransom.Stop.P5
McAfee Clean
Cylance unsafe
Zillya Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 0056d16b1 )
BitDefender Clean
K7GW Trojan ( 0056d16b1 )
Cybereason malicious.848e48
BitDefenderTheta Clean
VirIT Clean
Cyren Clean
Symantec ML.Attribute.HighConfidence
tehtris Generic.Malware
ESET-NOD32 Clean
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky Clean
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Clean
Rising Trojan.Generic@AI.100 (RDML:t3bthJ0Zsr+evDnpHHUlZQ)
Sophos Troj/Krypt-VK
F-Secure Clean
Baidu Clean
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Generic.dh
Trapmine suspicious.low.ml.score
FireEye Generic.mg.b83c9bd78a155d87
Emsisoft Clean
SentinelOne Static AI - Malicious PE
GData Clean
Jiangmin Clean
Webroot Clean
Avira Clean
MAX Clean
Antiy-AVL Clean
Gridinsoft Ransom.Win32.STOP.bot!n
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm VHO:Trojan.Win32.Convagent.gen
Microsoft Ransom:Win32/StopCrypt!ml
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5443273
Acronis suspicious
VBA32 BScope.Backdoor.RmRAT
ALYac Clean
TACHYON Clean
DeepInstinct MALICIOUS
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Trojan.Win32.Obfuscated.gen
Yandex Clean
Ikarus Trojan-Spy.MSIL.Agent
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/Kryptik.HFSR!tr
AVG Clean
Avast Clean
CrowdStrike win/malicious_confidence_100% (D)
No IRMA results available.