Static | ZeroBOX

PE Compile Time

2022-11-30 10:49:14

PE Imphash

c5965926ed2d4ea45d9d466b5022801e

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0006386e 0x00063a00 6.84071677926
.data 0x00065000 0x02154c2c 0x00003e00 1.37846086608
.rsrc 0x021ba000 0x0000dd18 0x0000de00 3.75840452778

Resources

Name Offset Size Language Sub-language File type
AFX_DIALOG_LAYOUT 0x021c7318 0x00000002 LANG_NEUTRAL SUBLANG_NEUTRAL data
AFX_DIALOG_LAYOUT 0x021c7318 0x00000002 LANG_NEUTRAL SUBLANG_NEUTRAL data
AFX_DIALOG_LAYOUT 0x021c7318 0x00000002 LANG_NEUTRAL SUBLANG_NEUTRAL data
AFX_DIALOG_LAYOUT 0x021c7318 0x00000002 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_ICON 0x021c6e30 0x00000468 LANG_SINDHI SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x021c6e30 0x00000468 LANG_SINDHI SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x021c6e30 0x00000468 LANG_SINDHI SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x021c6e30 0x00000468 LANG_SINDHI SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x021c6e30 0x00000468 LANG_SINDHI SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x021c6e30 0x00000468 LANG_SINDHI SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x021c6e30 0x00000468 LANG_SINDHI SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x021c6e30 0x00000468 LANG_SINDHI SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x021c6e30 0x00000468 LANG_SINDHI SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x021c6e30 0x00000468 LANG_SINDHI SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x021c6e30 0x00000468 LANG_SINDHI SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x021c6e30 0x00000468 LANG_SINDHI SUBLANG_SYS_DEFAULT GLS_BINARY_LSB_FIRST
RT_STRING 0x021c7bd0 0x00000146 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_STRING 0x021c7bd0 0x00000146 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_STRING 0x021c7bd0 0x00000146 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_GROUP_ICON 0x021c7298 0x00000068 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_GROUP_ICON 0x021c7298 0x00000068 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_GROUP_ICON 0x021c7298 0x00000068 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_VERSION 0x021c7320 0x000001e4 LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library KERNEL32.dll:
0x40101c EnumCalendarInfoW
0x401020 ReadConsoleA
0x40102c GetModuleHandleExW
0x401030 WriteConsoleInputA
0x401034 AddConsoleAliasW
0x401038 GetComputerNameW
0x40103c SetCommBreak
0x401040 CreateHardLinkA
0x401044 GetConsoleAliasesA
0x40104c ReadConsoleW
0x401058 EnumTimeFormatsA
0x401060 GetConsoleCP
0x401064 GlobalAlloc
0x401068 LoadLibraryW
0x401070 TransactNamedPipe
0x401074 GetFileAttributesW
0x40107c CompareStringW
0x401080 MultiByteToWideChar
0x401084 GetStartupInfoW
0x401088 CreateMailslotW
0x40108c DisconnectNamedPipe
0x401090 FindResourceW
0x401098 GetLastError
0x4010a0 SetLastError
0x4010a8 RemoveDirectoryA
0x4010b0 SetComputerNameA
0x4010b4 GetTempFileNameA
0x4010b8 MoveFileA
0x4010bc CreateHardLinkW
0x4010c0 FindAtomA
0x4010c4 GetModuleHandleA
0x4010c8 SetLocaleInfoW
0x4010cc OpenFileMappingW
0x4010d4 FindNextFileW
0x4010d8 RequestDeviceWakeup
0x4010dc GetStringTypeW
0x4010e0 VirtualProtect
0x4010e8 PeekConsoleInputA
0x4010ec SetCalendarInfoA
0x4010f4 FindFirstVolumeW
0x4010fc GetCurrentProcessId
0x401100 SwitchToThread
0x401104 GetCommandLineW
0x401108 GetDriveTypeW
0x40110c GetLocaleInfoA
0x401110 WriteConsoleInputW
0x401114 OpenFile
0x401118 GetShortPathNameA
0x40111c GetProcAddress
0x401120 GetModuleHandleW
0x401124 ExitProcess
0x401128 DecodePointer
0x40112c DeleteFileA
0x401130 HeapReAlloc
0x401134 HeapSetInformation
0x401138 RaiseException
0x401144 IsDebuggerPresent
0x401148 EncodePointer
0x40114c TerminateProcess
0x401150 GetCurrentProcess
0x401154 HeapAlloc
0x401158 HeapFree
0x401170 TlsAlloc
0x401174 TlsGetValue
0x401178 TlsSetValue
0x40117c TlsFree
0x401184 GetCurrentThreadId
0x40118c WriteFile
0x401190 GetStdHandle
0x401194 GetModuleFileNameW
0x401198 HeapCreate
0x40119c SetFilePointer
0x4011a0 SetHandleCount
0x4011a4 GetFileType
0x4011ac GetTickCount
0x4011b4 Sleep
0x4011b8 RtlUnwind
0x4011bc GetCPInfo
0x4011c0 GetACP
0x4011c4 GetOEMCP
0x4011c8 IsValidCodePage
0x4011cc WideCharToMultiByte
0x4011d0 HeapSize
0x4011d4 SetStdHandle
0x4011d8 GetConsoleMode
0x4011dc FlushFileBuffers
0x4011e0 LCMapStringW
0x4011e4 ReadFile
0x4011e8 WriteConsoleW
0x4011ec CloseHandle
0x4011f0 CreateFileW
Library USER32.dll:
0x4011f8 CharUpperA
Library GDI32.dll:
0x401008 SetBkColor
0x40100c GetKerningPairsA
0x401010 GetCharWidthA
Library ADVAPI32.dll:
0x401000 ReadEventLogA

!This program cannot be run in DOS mode.
`.data
Unknown exception
CorExitProcess
bad allocation
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
(null)
`h````
xpxxxx
_nextafter
_hypot
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
GetProcessWindowStation
GetUserObjectInformationW
GetLastActivePopup
GetActiveWindow
MessageBoxW
`h`hhh
xppwpp
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__eabi
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
1#QNAN
1#SNAN
ficeh pazigiyucalu moziwavos zanahetezikavatuhu
tocamekeva
vexisujufafewa ragapoz kugojunifabeharapuzava hatetoyed gihorodiwapuxurizodewojujuwori
fehiloralus
xejarasubufiviyudayalekexi karikixaxebabepumecisu govazutafedocuzah bedekejor
sumikayevurubemixusivogusiw mil nuceja gurepoxisiroxamanutakid mofufoceyaharayesatevikawowav
wimujojewinapetixoxemeyadit dumicefo xekujesife cazuzizegoyi
%s %d %f
pesera mafigokamohigezegup tom
nolexeyupilujojadasopabe
jafodoheyerotimeximucazari neweguhikocivohazah fiweduhoxonebovo
loroxapulesurivixemokaxejizoye girik
kulerox xarugukagelemovakudij wakuneg
yebara
Rap fidajositevubekeyome nulufeyi
jokemafibevuxigic
string too long
?Dj0Q:W$=
5s3R6=
bad exception
jXh@7F
j h`7F
tWItHIt9It
r=HTF
^SSSSS
HHtXHHt
?If90t
QQSVWh
j@j ^V
URPQQhp
Fh=PWF
;t$,v-
UQPXY]Y[
t"SS9] u
vL;5$_F
PPPPPPPP
PPPPPPPP
<+t"<-t
+t HHt
u-h 4@
=*TYV?
eU~%iVik
*h6t30v
>Ftn6Y7
%^9GTh
Pv$v\r7
f :51&
kJ(Z@(
bhWV/Hc
@c,(U~Z
Qg\?y@4
aT3,pG
!c'9~K#
_1@K<s
g14F};
13CENp
%n[S3p
WOL8RW
:^h&#u
yJ\8Kb
4M8,#(
2H7#@an?1
i?TOSQ
fO(sCr
k<:Ky0
=JHFsW
W_b`#(
xB}kR:
Q223}z
QOK*1t]1
LS(l:O
O7l;,^
u$Op_v
b}.</\
:a:)B"
`NAz@
c*<5=P
&/<0r:+
o\kS{B
9~>QI6
M-p'WF
TY+|`
MY U+T
=T$_h>OCf_
)MlIr<\t
'?k`RO)
XvteOj&
oJFZ@ap
M:9Q/f
N(qnHR
P#L^X
&m1K2P2
7O[v<L
m0*0/y
?>T<!mA~
&YW{_Q
d4%y;v
rW4$k0
_!OYH\
5pLnlm
Gy{OMJg
SUF]{l
JkC`O4R]
hiqPer
!Gb>3K
5'p,TA
TiCoH_
JN"t6^p
&b8OG_U\
-J+t]?Q4IS
u95g8U7
X]&*qV
Nq'q$
6:'AQy
3kD*$rlv
xtS7u&
W^iM4i
kk;Jo"
weMASf
LVJ-Y$
jg`6bH\
#@YjZ9
NHjNE`K
{n>+6c-`
SP./^m
O?bF'
\cL0Y'
Te+2W)
9S9(MV
D6}A&{
hayGqR7
3x~t9$
,?ygSV
2_*khs"{
=0[Et;
&#>[m&
_5Q$O
6Ev"DKA<
g~A\IA
aN+J;M
?(D/x
&1H(5/
):=%NNC
8>d,T;
<L#=CF
V]5KL%
T\)zK?P
cd]hft
LS-H!
Q5!qS9
j,+S}1
8L )T*
@8~S>+N
t!#5Y9
"&%yz
]'Vf*vi?/
8sIm_`
_J!4fY
)OoNC}
v/ 8 5B
a<wOC!
="\qeT$
nUR;@h
?{1c-}u
S{3p^M
qp2znf
pL6j<?
S0~`Q
,NDpRH
lC;_D1
a+gkGc
MNLH_A
oZKs{;
Ij~48M
[P`kbc
3.-m6^
-;hqhZ
(w<4%
U_(S03
2b<n$^?Zfl
4Y!,DZQuU
bCK6O.[b
d%5j9d
3:}S4
M-T'')
<DOS@.{
xkr*G;
FfwA.kz,
3*DFJ+
:r,OlT&
; wSX3
j$iY_5S.
(u;:?f
\d'g.qr
tF* )pB
lK3gLV
>:b&9
U+0mKs
!]Cf>|}
Y\12=D
|UW|V^
aBe*C;Zn
sXy=gZ
q0$nMz
$;a3!
C%1h7>
iOT$ &
vJFcH%:
()j#&9
$-4m&V
eH@!:0
>|$Cr0J
!P^(GL
.FxLaS
A~DiH]
@dn+g3Z;d
!N6Pvf
MPK4A4
4&38W]
VC7srT
knnlGp
zu/.C:E
3v%\CbVw
!vC;W6=LRy
C`jc#&
{zv=P7
)Qgjkg
iqqWg^eB
.a>LQ7
f5~%s
!D)?(/
|MT)&R
fUiXx!
SBUk#
Ffci\~
UJmgi^
f7XEiW
?.T{pt
=<xorH8
7>a^qA
`NQY#w
LjDwOdR^
RxDs:4
L/] PM
M_K2a%
:0v/U
Ezz[8D
I(>cp
\l_zR=_
x,Cf(E
$dZ0!%
#=-v@#
9)cR2y[
%aqy_@
\)B/G,
D3kskC
9Q{Q~,
1G>-V'
PkvE1G
{@@0Fm
(=SVlx
4eKenj
d7i^?[
O?^qb2
(TTihHb
-{Tsc5
&5BlzL
G[nDY*
\%5k@S|4
"j[RYT
RYVOm
rSo|t,'
_KR|LuH
6NYN->
FM{4Ep
Q-O|[t!`
?zE42*
~@~L<)
CL7F$zm
w&3Q,!
hyUy+:
Kh'ip>
lW_2|b
]7qrYw
HVK8[KD[
!6[IS{xW
Xt-[u8
*7arg1
c5|aZR
S6%LiYw
B|jYUO
SUYAE=w
|1MIP!Rf
8}f1nP
8rnZl:
,}jH )
,e:D]i
hf3N 7
p'jK)VY|,
17l!R;JuIx
$o<tnN0
HRG'>S
qFkw/m
rH@ta `JE
8A;T%h
=bR5LU
+u{3</@Z0
W[CN/|
M{mV5\
<7&yR !
>[auSv6
_z-0f!Q
eu^V<weT
+B! +#
"2N]d<
8Bs5NX4
K+(bLz
`1S%Gl
!@$fL
Y4 ^:[
9T=+'Ed
"N)Tww
DF;Y(Y
@K~Dzr
<*Pk\7
rFTq9&F
~eYxZl|
@r3SY#
{UmSx@1d
H]NRw0
CxdtX3
X;9jFn
50*^/J
$S!}rj
iKP7u6
Xdb_p"
mO[aZi{
v:L^-6
gRnvLHe
n'(xS_
%?@']6
M$&O_L
pD#Omq
EdOC/n
,rx,Lt
/ZB8~v
-t62$Y]
Va.~TF
u/4Ai_
q|60pX
%vC<5%d*s
E_!Mm
9W3`DZ
Hh6;PT
5a!Zyr
,boN_U4
5'e5x%p
|rW?MoM
4N:+U#R
"9g~X(
)yd+\;K
nG[e4>!@
/6)X4;
BPsN]q
%CWluj@>
/LxnVu0\
28+P]
rdqUiMC;)
q}0Jai
;d2<sK^
{[Aa{[
CL3uXE`
d;ux77
3\UJz<
p-8Iv3
8|/v@w9n0
bRO3<i
oz&*(q
A:7Nf/
(|yNV#
w`%vy[
Vx^UH7
JR{CDS
1M#KIZ
/X`gH~
<LJOSL
y[!U36
qf]`o5
DqN\jV
kKjMfM
7o@ke[a
2Iy}lW
T;)z2h
W#&!0eU
7gt}7gv
|J| ((s
\v/V[>
~O:)'1
Gl|[1?b
6N=L:8
B3G{_F
'.a>pW
\+\Oil
ZdJZ-{
57H3L;
[<UdX!
=@6p=eQ
@H?Ugo
IEpqQG
uxByAv
A}DWffvm
PKAsTu
[|MhjE)
(g_9}r
+3(%z
`>'Env+
}h }-,
zG42e
ORkB6`S
n~<7Q;
jv3q&+Kx
[OLHE;)
MP7dAUv
2B/Mb
Ib{${C
FvZ&P*
^qn 5Q
fPKo!k
TE&/Qr
CttS7t
vj+c@b
6>p_W4T
exqqo"
g"(U-z)@
g}G&|b
^kxu':
:yr'1R
(~VFRg
D$LPh04@
D$H9|$\s
D$HVUP
t$X9|$\s
D$8Ph8:@
D$|\Sn1
l$,l<Y
D$(a57B
QQSVWd
t=MOC
HtHu4j
t*=RCC
;7|G;p
tR99u2
tRHtCHt4Ht%HtFHHt
GetCommandLineW
OpenFile
WriteConsoleInputW
GetLocaleInfoA
GetDriveTypeW
FindResourceW
DeleteVolumeMountPointA
EnumCalendarInfoW
ReadConsoleA
SetDefaultCommConfigW
GetEnvironmentStringsW
GetModuleHandleExW
WriteConsoleInputA
AddConsoleAliasW
GetComputerNameW
SetCommBreak
CreateHardLinkA
GetConsoleAliasesA
GetConsoleAliasesLengthA
ReadConsoleW
GetCompressedFileSizeW
GetConsoleAliasExesW
EnumTimeFormatsA
TzSpecificLocalTimeToSystemTime
GetConsoleCP
GlobalAlloc
LoadLibraryW
InterlockedPopEntrySList
TransactNamedPipe
GetFileAttributesW
HeapQueryInformation
CompareStringW
MultiByteToWideChar
GetStartupInfoW
CreateMailslotW
DisconnectNamedPipe
GetShortPathNameA
GetNamedPipeHandleStateW
GetLastError
GetCurrentDirectoryW
SetLastError
WriteProfileSectionA
RemoveDirectoryA
EnumSystemCodePagesW
SetComputerNameA
GetTempFileNameA
MoveFileA
CreateHardLinkW
FindAtomA
GetModuleHandleA
SetLocaleInfoW
OpenFileMappingW
FreeEnvironmentStringsW
FindNextFileW
RequestDeviceWakeup
GetStringTypeW
VirtualProtect
QueryPerformanceFrequency
PeekConsoleInputA
SetCalendarInfoA
GetWindowsDirectoryW
FindFirstVolumeW
GetVolumeNameForVolumeMountPointW
GetCurrentProcessId
SwitchToThread
KERNEL32.dll
CharUpperA
USER32.dll
GetCharWidthA
GetKerningPairsA
SetBkColor
GDI32.dll
ReadEventLogA
ADVAPI32.dll
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
DeleteFileA
HeapReAlloc
HeapSetInformation
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
HeapAlloc
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
SetFilePointer
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
HeapSize
SetStdHandle
GetConsoleMode
FlushFileBuffers
LCMapStringW
ReadFile
WriteConsoleW
CloseHandle
CreateFileW
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVtype_info@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVexception@std@@
.?AVbad_alloc@std@@
.?AVbad_exception@std@@
yx^p+2
%J$)y?{C
XM<x{{\
{}~~~z
~~}}{|~}
}|y|z~
~}}{z{
||{{{{~}
z|~}z~
||{~}~
|z}}~~
z~||{{}}
}}{}|{
z{}z|~~~|
~||}~|
{z~||{
~~~{|~
zz}|}}|
{~~}~{|{{}
}||~y{
||{z|~
{{~}~{
}~}|}{
}~||{}|
dddddddddddddddddWo
(((((((((((
$($($$($($$$$$$$$
%o&B$aaaaaaaaaaaaa9aaaaa$B&o%
999999999999999999999
aLLLLLLLLLLLLLL4LLL4LL4L4L4L4L9B&o%
%o&B9444444444444444444
4444444444
'''''''''
IIIIIII
7cccccc7
........
mscoree.dll
wKERNEL32.DLL
runtime error
TLOSS error
SING error
DOMAIN error
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
- abort() has been called
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
@Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
(null)
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
WUSER32.DLL
((((( H
h(((( H
H
CONOUT$
tayidaf
hukepohiwuvegorumalarif ciyicumajavitezerumepugon
oyeridavosoconayehayezogahufula hovawoh tayayiraj huc
Kox faticicuyudahi puhametakozelugidizike
hetuyosehesomozexabarorazu
pofihajetiloyuginigehezebuxuwu watimofejoh bodubacigati mavinexubehaganajinutazobizes
paxijuhevitewabem patiyosejowivasekotiyibat webibesejafov bugipakanukixoxiduporetanesotimu limuboxajabojutahaduvepugufe
Xiw silavucenulotosade yux
fepirahaponejere visavotu
wusajokegejanore bukepohimer
caxozupefugexuriba gasoholixapadeda liseligiyajitaxafiruwipodo
Nis jirefitokigal zupolemufajobiyawenoyotedis latakunigube
vexeravorodazabedoburiyoritamuya poyoxifehefinohotiramohu noxogurewamoyagicuri molebufenafibif keboserubonuhuf
@jjjjjjj
AFX_DIALOG_LAYOUT
VS_VERSION_INFO
StringFileInfo
029485B3
InternalName
Astronomic.exe
LegalTrademark1
ElonDoesntGetIt
OriginalFilename
Kujingle.exe
ProductVersion
12.31.91.98
VarFileInfo
Translation
oComow naseliwawa ragosikipusuran xosasoviwadili nasigevo tuhozuleyuhunu vugojomoxokewuz molaveloradu gixe dowiz6Gajaya juha gelikepaye yenuhanapepi senibakuzide letof7Pegugeji badek subufofa mebuhigohovejel sofodobopuvezob_Nurofahem guzozenike dufamuvocafayu vulo fumusofi zohupixi botehicok nozehisub cexupoyurolo cut
VelezazaxedifiTPemula fapave gabecosat rexi sase kobihayigefib lexerowi wakuma kakidonaxibi sibirem6Dehelagexav yokeku memig revufebericiw bopugakobowayix
<Hemo yamal hipi nawafumesoneyos vayesifim leziyifuka jeyinav
Saxo yiyugivin coxedaRGalew hesozofixoxej nobefasi foy nozu popudaferanu rotomupasojaxe rid gipab jususubRecogijigub honebenemufem zopofoxucoz xiwi yikomovuye ziwezocogi ligufajotenegeg zaligo zucaluyiji&Sasafu sopid pehesavofigu ripumibokaku
Zenin juxonunuwi%Wukesadivecu pilocabesid vuyunisumuta
Gohiputajayowol
Ramexihefalawob@Rabedibulozox maganufo rin fuy ciducuticefo porapecuci dejakobixDDejele yuxe tuduhufeselelax yuyola pojilureg wivasuvulad zeku denari
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Clean
Elastic malicious (high confidence)
MicroWorld-eScan Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Ransom.Stop.P5
McAfee Clean
Malwarebytes Clean
VIPRE Clean
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 005579741 )
BitDefender Clean
K7GW Trojan ( 005579741 )
CrowdStrike win/malicious_confidence_100% (D)
BitDefenderTheta Clean
VirIT Clean
Cyren Clean
Symantec ML.Attribute.HighConfidence
tehtris Generic.Malware
ESET-NOD32 Clean
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky VHO:Trojan-PSW.Win32.Convagent.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Trojan.Generic@AI.100 (RDML:CQbTcZY7Si20E5BXbBaB/A)
Sophos ML/PE-A
Baidu Clean
F-Secure Clean
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Lockbit.gh
Trapmine malicious.high.ml.score
FireEye Generic.mg.697af19045d5835b
Emsisoft Clean
SentinelOne Static AI - Malicious PE
Jiangmin Clean
Webroot Clean
Avira Clean
MAX Clean
Antiy-AVL Clean
Kingsoft malware.kb.a.1000
Microsoft Trojan:Script/Phonzy.B!ml
Gridinsoft Clean
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm VHO:Trojan-PSW.Win32.Convagent.gen
GData Clean
Google Detected
AhnLab-V3 Clean
Acronis suspicious
VBA32 Clean
ALYac Clean
TACHYON Clean
DeepInstinct MALICIOUS
Cylance unsafe
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Trojan.Win32.Obfuscated.gen
Yandex Clean
Ikarus Trojan.Crypt
MaxSecure Trojan.Malware.300983.susgen
Fortinet Clean
AVG RansomX-gen [Ransom]
Cybereason malicious.1cb2d5
Avast RansomX-gen [Ransom]
No IRMA results available.