Static | ZeroBOX

PE Compile Time

2022-10-16 07:26:51

PDB Path

C:\nomes-penezebozurede_54-s.pdb

PE Imphash

f815858bb8146375fb6d659cf6f7de7c

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00021368 0x00021400 7.66911677603
.data 0x00023000 0x0201df04 0x00002a00 1.08794534162
.rsrc 0x02041000 0x0000aca0 0x0000ae00 4.29762582098
.reloc 0x0204c000 0x00007cbc 0x00007e00 0.928084357501

Resources

Name Offset Size Language Sub-language File type
RT_CURSOR 0x0204a568 0x000000b0 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_CURSOR 0x0204a568 0x000000b0 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02049f68 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02049f68 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02049f68 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02049f68 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02049f68 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02049f68 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02049f68 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02049f68 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02049f68 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x02049f68 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_STRING 0x0204b7d0 0x000004ce LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x0204b7d0 0x000004ce LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x0204b7d0 0x000004ce LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x0204b7d0 0x000004ce LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x0204b7d0 0x000004ce LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_CURSOR 0x0204a618 0x00000022 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x02044568 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x02044568 0x00000030 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x0204a640 0x0000026c LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library KERNEL32.dll:
0x401008 CreateFileA
0x40100c SetThreadContext
0x401014 PeekNamedPipe
0x401018 SetEndOfFile
0x401020 GetTickCount
0x401028 GetDateFormatA
0x40102c ReadConsoleInputA
0x401030 SizeofResource
0x401034 GetFileAttributesW
0x40103c GlobalUnlock
0x401040 GetShortPathNameA
0x401044 FindFirstFileA
0x40104c GetLastError
0x401050 SetLastError
0x401054 GetProcAddress
0x401058 GetTempFileNameW
0x40105c BackupWrite
0x401060 LoadLibraryA
0x401064 CreateHardLinkW
0x40106c SetFileApisToANSI
0x401074 OpenJobObjectW
0x401078 FoldStringA
0x40107c GetModuleHandleA
0x401080 SetCalendarInfoA
0x401084 FindFirstVolumeW
0x40108c WriteConsoleW
0x401090 GetConsoleOutputCP
0x401094 WriteConsoleA
0x401098 CloseHandle
0x40109c VirtualAlloc
0x4010a0 HeapFree
0x4010a4 TerminateProcess
0x4010a8 GetCurrentProcess
0x4010b4 IsDebuggerPresent
0x4010b8 GetStartupInfoW
0x4010bc HeapAlloc
0x4010c0 HeapCreate
0x4010c4 VirtualFree
0x4010d4 HeapReAlloc
0x4010d8 GetModuleHandleW
0x4010dc TlsGetValue
0x4010e0 TlsAlloc
0x4010e4 TlsSetValue
0x4010e8 TlsFree
0x4010f0 GetCurrentThreadId
0x4010f8 SetHandleCount
0x4010fc GetStdHandle
0x401100 GetFileType
0x401104 GetStartupInfoA
0x401108 SetFilePointer
0x40110c RaiseException
0x401110 Sleep
0x401114 ExitProcess
0x401118 WriteFile
0x40111c GetModuleFileNameA
0x401120 GetModuleFileNameW
0x40112c GetCommandLineW
0x401134 GetCurrentProcessId
0x401140 RtlUnwind
0x401144 GetCPInfo
0x401148 GetACP
0x40114c GetOEMCP
0x401150 IsValidCodePage
0x401154 SetStdHandle
0x401158 HeapSize
0x40115c LCMapStringA
0x401160 WideCharToMultiByte
0x401164 MultiByteToWideChar
0x401168 LCMapStringW
0x40116c GetStringTypeA
0x401170 GetStringTypeW
0x401174 GetLocaleInfoA
0x401178 GetConsoleCP
0x40117c GetConsoleMode
0x401180 FlushFileBuffers
Library USER32.dll:
0x401188 GetMessageExtraInfo
0x40118c LoadMenuA
0x401190 DdeQueryStringW
0x401194 GetClassInfoExW
0x401198 GetKeyNameTextW
0x40119c CharToOemBuffW
0x4011a0 SetClipboardViewer
Library GDI32.dll:
0x401000 CreateDCA

!This program cannot be run in DOS mode.
dRichW
`.data
@.reloc
bad allocation
Unknown exception
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
CorExitProcess
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
CONOUT$
bad allocation
fopasufidu
sizipezosuyubukusitolezuwazew yomihebobaravapupab wiruh
wuximi zekugovex kocimug
nakaticubeduk fabowuxilemecixixojolina vanikoyatosoco gewutoxenucobenebor migipobiduvefoniyikoxovuz
rujehulayafaligubovotodeho
Zijezixafap kuvakimuhit coxuyu ticuzetapede yetoraxu
fotixizagesewilimiditefozo tacixowovutoyop weyavefogelu solaropejuxacuwuvereposeyogij
pawiyevatuworusanuha
kernel32.dll
tilegupal gilumogubuhitunite
zuvebebucuzokonav pujetotanenovucivabokatek
msimg32.dll
bad exception
C:\nomes-penezebozurede_54-s.pdb
PVhX+@
VVVVVVh
D$xPhh-@
D$4PSS
WWWWWW
WWWWWW
0SSSSS
teh{\@
j@j ^V
uBh\u@
>=Yt1j
QQSVWh
URPQQhh{@
0A@@Ju
0SSSSS
0SSSSS
0WWWWW
AAFFf;
;t$,v-
UQPXY]Y[
GWh`!@
t"SS9]
FVh`!@
PPPPPPPP
PPPPPPPP
t+WWVPV
]!MFmmF+
g`*(<W
NOGFfH
KJRew)
)JN%L2
[qFNP+
(.=2jF
W/%HF4
;>--u}j
MmV<xH
1*ktg|
]E&u,~
<P>77WDF
_wIEwR>
k3W=n4,0
5>LT"-T
+t?00>|;]PQZ|
1?FDw-
vQQZY_
t*Yj"^
x*Yj"^
I<gu45
jF4sKa
jF4s`7Q
-Wk&Pr
P.k*x#
v53KLQ
xhWa??
yw'Wg4
^)4!jH
EPl:Rw
zB?^{I
6o@$=ikZ
%ah!I5
gk.>%B
'YK#yOu
k/Ui)ka
WxHCJ6
qNl(|%
m(={dC
N:C+HQ
W"c#My
-P/1P+
+"}!/_
xiY3<+
gn4Bj#ILT
P\l3h}
-3thPlM
84JoF0H
l&Lw@J
8SiD(C
'(aD>ld;
t#fx#9
c%[Cv/
yB}WEu3
VP33?O
a|'aUT
4zxnR^
#8'%-4
EFYww$
6l8T}W
iS]m==
ACA(TRD8
;Zf,p1
/jrS%N
va]dEi4o
6c(O&p
q8slxC
F`fC2TQ
^ jth/
7=Dl~j`
I}Y -H
'(\jQs
Hy,_(
z,=[VQ`
2rFT~Q`k
,NcD`$
?UhCqa
QYoz^=f
vB\L4k'
7TSB"J
Bof76}8
9e\owCc
vSw|N9
Ky/}2&i
a'R+5ng
&1]o7+
i*X7aA
w,`;K_
^m-+0mK
d)f|h%
F|Niz
U2vu2R
z/V8p"
}_)Gvu7
H=dP5&+A
eAC&xf
7(=h>q
*V9?OX
?wF\G9
l4?!zY
{vQE!P
Qp#4aB
$NC>L_
qnIkKX
0br`YC
3Yud X;D
E408PZb
|zr7G"
j8wAe'
nq?]X]
IE?n*%
g.R.~E
$="~b{
K-_3?D
L06W8|[
"8w7
K34yGx
c54|RY
RC'!3(
yOWj:1
{:,YLm
zq&3V5&
yjkG8v
&PS%354
h=%whPm+
3'i<H1
v]oi0r
mG3Qj3
`gXloB=1
2C{ *X
syJR(y
Bj5({M
h^GnL!_
23Ii\j
/F#Jm`
lpLB=:A
GD?I{rLw
eE$Uht`c
u`1Q*
xEMcZV
]g)c9`tstf]X
szJj`kD
6}`/}Q
W$Gn_1
.a|nad
hFCmdI5
.@cIS.
C@hKrB
fU%zf&
@MC2~78i
Mn[.;V
l.KV%r
cI/N,Y
PkEB7#S
FGG<pj\
PW )C;
rxHc~*v:uT
LHRGD!g
"x;sy7
BW,"K1
Elndhx
0*F=0|
eXg=X4
9N7EV}
?)a8Vy~
eSB,8@
QQSVWd
HtHu4j
s[S;7|G;w
tR99u2
GetTempFileNameW
CreateFileA
SetThreadContext
FindFirstChangeNotificationW
PeekNamedPipe
SetEndOfFile
FreeEnvironmentStringsA
GetTickCount
GetConsoleAliasesLengthA
GetDateFormatA
ReadConsoleInputA
SizeofResource
GetFileAttributesW
FileTimeToSystemTime
GlobalUnlock
GetShortPathNameA
FindFirstFileA
GetLogicalDriveStringsA
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
BackupWrite
LoadLibraryA
CreateHardLinkW
SetConsoleCtrlHandler
SetFileApisToANSI
BeginUpdateResourceA
OpenJobObjectW
FoldStringA
GetModuleHandleA
SetCalendarInfoA
FindFirstVolumeW
ReadConsoleOutputCharacterW
KERNEL32.dll
SetClipboardViewer
CharToOemBuffW
GetKeyNameTextW
GetClassInfoExW
DdeQueryStringW
LoadMenuA
GetMessageExtraInfo
USER32.dll
CreateDCA
GDI32.dll
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
HeapAlloc
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
RaiseException
ExitProcess
WriteFile
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
HeapSize
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
.?AVtype_info@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVexception@std@@
.?AVbad_alloc@std@@
.?AVbad_exception@std@@
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
z6666666666666666666666666666666666
ggggggggggggggggg
VVVssl
pppppppppppp
VVVVssll
7-K-7ppppppppppp
VVVVsVll
-SCpppppppppp
VVVsVll
pppppppppp{6H
ppppppppp
pppppppp{6H
--Cpppppp
KSlppp
L'''''
L''v-"
6666666K
+KKKKKKKKK
KKKKKKKK-l
tttttttt-*
VVVVVl
pppppp
K=''''
w/ppppppp
ppppppppp
&UUUUUUUU
pppppppppppppppp
pppppppppppp
pppppppppppppp
pppppppp
jjjjjjjj
pppppppppppppp
pppppppC
sssssVsVVsV
``````
#$$$$$$$$$$PKK*
VjjjjjjjjjjjjjjjjjjjjVY
TR%";g<#WN
----T'
)))))hd
Tx!7Tm
99999999999999
F33333333
```````n
RRRRRR
'''''''";
3!!!!!!!!!!
{~z{}~
{z{~~y
~~}z{zy
~|{~}z
{~{~{z|~
{z}~z{y
~||~|}
~{}z{z
y{~||}~
{~{~~}}
{y|}{~
~}}{|}{
z|{{|~
{|{z~|
{}||{}
}z~|~{
{z}|||~~|
z{~|}|
~||||}
~|~{|{~
}~{|y~
}~{{~|}
z{|~~}
|~}{{y
|~}|~|
~|~}~~
~{}z~}
2 2$2<2@2D2H2L2
9p?t?x?|?
0 0$0(0,0004080<0@0D0H0L0P0T0X0\0`0d0h0l0p0t0x0|0
? ?(?,?0?4?
0 0(0@0P0T0\0t0
2&2,2M2]2h2u2
3#3,3N3b3h3z3
434M4T4Y4a4k4r4|4
4-565<5I5N5U5\5b5j5s5
6 6)6/686W6o6u6
63787=7B7P7w7|7
3-3B3g3{3
4m4V5h5
7$7G7Z7
8/868O8c8i8r8
8>9^9l9q9
<)<<<G<M<S<X<a<~<
=$=5=;=L=
6F6N6c6n6
:#:.:::O:V:j:q:
;-;<;C;P;s;
<$<@<X<~<
=%=]=e=
>#>/>4>9>?>C>I>N>T>Y>h>~>
#0A0H0L0P0T0X0\0`0d0
0&111L1S1X1\1`1
2J2P2T2X2\2
4*575W5q5
6"747B7W7a7
7%8.8N8S839>9
:,;2;G;P;};
;/<7<J<U<Z<j<t<{<
=C=P=z=
??_?d?
2;4G4M4R4X4
525:5?5`5e5
6!6*6?6o6
7;7D7P7
8-8S8q8x8|8
8V9a9|9
: :$:(:,:0:z:
00)0]0h0r0
2 3,3?3Q3l3t3|3
4D4U4x4=5g5
7#7_7!9'9-93999?9F9M9T9[9b9i9p9x9
;==M=h=
?E?R?W?e?
@0c0n0
2H2S2`2
2%3*3o3t3{3
5*505>5G5V5[5e5s5
5U7\7b7
;=<W<`<
2+4=4O4q4
>$?[?e?
0 1Y1f1E2T2
3P3Z3r3
5 565Q5
647A7Z7 8&8+81888J809
v1/2G2L2
4C5P5c5+6Q7J8
3$3/33383`3
404<4T4X4x4
585X5x5
6 6<6@6\6`6
7 7@7H7\7d7x7
8 8(848T8`8
989@9D9\9`9|9
0 0 3(3
6$6,646<6D6L6T6\6d6l6
<(<8<H<l<x<|<
= =$=(=,=0=4=8=<=@=D=H=L=P=T=X=\=`=d=h=l=p=t=x=|=
(7D7`7d7
KERNEL32.DLL
mscoree.dll
((((( H
h(((( H
H
rerotilunanafoxekusufu bopozilazuso
zwafibanabogucosowejusehifasi
kernel32.dll
pozegukafelurokapesirubihijow
sunaruhubawuluyisapedodo
Lunafuxol xutuf buludedazis torolunizuy
Bozadasewika gaxu hoyuri teraxuyerunoj vakuja
VS_VERSION_INFO
StringFileInfo
042231F2
FileDescription
Silvuple
LegalCopyright
Copyright (C) 2022, Uniqum
OriginalFilename
petshop.exe
ProductsVersion
9.50.11.69
ProductName
Junfsiol
ProductionVersion
82.67.62.16
VarFileInfo
Translation
uTozunirutikagal fehimaci xibotaru xezitayetotubal folod liwayehurivope rogelelofopuzo gimijoleg gajohosiye yukuzakaru
-Hiwuzabom difukogewabut dofedom rusedadudokih1Pozuwoyoximeb yimubaha rupizotot yagas vigubegugeOSevune zumirebujeno hajoyiramamog torimakiva yahacucaji pohujetezucif karamumor<Dokacibeduzef satemodo lazekidekonahi bomaxogece zeralohocovMukefirudatey bip zapudij miwev
=Guhidaxacejaso dehocavohuseki fuvusukirozonad necovakuwegijow
#Fuxakewowomuc vulifuyakibime bufige
Buhigip cirosovukaxavig zipovohosubiro vimimeyuhivisun fodolisabocita muvejehifo zeyovehubasa yodimabupahoha dusebovur xuluciwogarix
!Vevojamogu kor nujiyoyijador dewi
AHadicegu jopahiyedocon vofu midumezomijil kozufova viw josulujamo
RRimudufaye ximarecacehupo mecuvuliw dupucixolilom ruroje cuvakemogidaxe letoderuba>Zukefoj cacajisora mopiwob nuz yubunul dotebibin jetulijoxazemXHin dezigixune wuya jiroduguni kineteser vekadik pis bonemev kuhecocehurigod zozutuhujej_Pimer powahakukenano dakatagubada fucowivivuca logirizosat wop yih fizuf pubuyijekega cuhoyeguh
Dijiti yulorepap ruziwucidayelNNojuxoj yed vunigawun xefafixadowubi meyovavup sevo girur gepaziyale hewuwemijcYura zewocidoriv bobokagoriyuyo zawagac zoyik mezexukegaruvez nadoxuj ciluyolofu navon kegulepokucu\Dixojimituwan gixabeyuwaba secisoxoyi zowices texizuxu witodafuy kamuk kimij kinapaleciyajih
Rifay yilojoy hukaweyahitocum
Citifecuko xuje$Doroyepiru tawejedutazij watamayoyorbConavalerazuja kixuboyapavi xojij jezaxakuzan zidasefozohe gijokoyo vucohotorovixe coxetaxijerenasoJimusanibazi xufupatok cayuvamije lebe tefebowanij wilebosapuzi vijogusavobif jopuholoxadi tomemapi xaxivohahag
Fapoxodecerisa zupakuvebPof tunawo worelilifoca tipotibami cacodigeveva sipusu furumibot hurucak yemujabekel botigecigeteg=Nedizimuh keyafi faduliwivaxabof xujawodipale gubalafujaworat8Jaduxovupufem zicenomu kecumahuzusah pim jukalogacecaxev
Demazu
Hidiyi
!Dorayegahin wuvoxerot nun fotozen2Dunakevuc rojime vapokiduta vulorineyuzewaw gupobu
Gah wofejcSazotararuzalut vodaya bexuro lojelicemoc wurosiboz gikuki lirebo gariduyufah xayedopimuwe gudelawiHNajidabo poyedificazoy kupuy zeguzicovud soneg soyaxikuzavet junoyuyoriy3Vixaruwa mowohutoy kegoran rohigokapumi hazezopukohRNutix jegat didirocekujuwub xay gonecor gum vimuyolax yepibimezam fepovohidiz vuto
Funafuli naxixuyerenecozVVuyisucogozan kojixidoripujah cedaduzo yod hedepujos cohepoyuvopewan xiga pad lofoheta
JimTKenixikewavub locobekogeh sukagunimuwic kutevu vigak sugi xaci xewejikote wipuvu sog
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Stealerc.4!c
tehtris Generic.Malware
DrWeb Trojan.PWS.Siggen3.33582
MicroWorld-eScan Trojan.GenericKD.69220934
ClamAV Win.Packer.pkr_ce1a-9980177-0
FireEye Generic.mg.43d6aa62427fda7e
CAT-QuickHeal Clean
McAfee Artemis!43D6AA62427F
Cylance unsafe
VIPRE Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Riskware ( 0040eff71 )
BitDefender Trojan.GenericKD.69220934
K7GW Riskware ( 0040eff71 )
CrowdStrike win/malicious_confidence_100% (W)
Arcabit Trojan.Generic.D4203A46
BitDefenderTheta Clean
VirIT Clean
Cyren W32/Kryptik.KPX.gen!Eldorado
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Kryptik.HUOO
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky HEUR:Backdoor.Win32.Androm.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Trojan.Generic@AI.95 (RDML:/KKA5N+pqvKy9tMpDvKvVA)
Sophos ML/PE-A
F-Secure Trojan.TR/Crypt.Agent.fnxtw
Baidu Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Lockbit.dh
Trapmine malicious.moderate.ml.score
CMC Clean
Emsisoft Trojan.GenericKD.69220934 (B)
Ikarus Trojan-Spy.Agent
Jiangmin Clean
Webroot Clean
Avira TR/Crypt.Agent.fnxtw
MAX malware (ai score=80)
Antiy-AVL Clean
Gridinsoft Ransom.Win32.LokiBot.bot
Xcitium Clean
Microsoft Ransom:Win32/StopCrypt.MNX!MTB
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Backdoor.Win32.Androm.gen
GData Trojan.GenericKD.69220934
Google Detected
AhnLab-V3 Malware/Win.Generic.R604820
Acronis Clean
VBA32 Clean
TACHYON Clean
DeepInstinct MALICIOUS
Malwarebytes Trojan.MalPack.GS
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002H07IB23
Tencent Trojan.Win32.Obfuscated.gen
Yandex Clean
SentinelOne Static AI - Suspicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/GenKryptik.ERHN!tr
AVG Win32:DropperX-gen [Drp]
Avast Win32:DropperX-gen [Drp]
No IRMA results available.