Static | ZeroBOX

PE Compile Time

2022-07-22 21:49:01

PDB Path

C:\rubeceji\xoxa63\mazehij-duj.pdb

PE Imphash

da3e442c2d2024285cdd03f77dec5d8f

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00020464 0x00020600 7.69801769707
.data 0x00022000 0x00175fe4 0x00001c00 2.45832028099
.rsrc 0x00198000 0x00013af8 0x00013c00 4.33387416319
.reloc 0x001ac000 0x0000261c 0x00002800 2.43258167952

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_STRING 0x001ab8e0 0x00000212 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x001ab8e0 0x00000212 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x001ab8e0 0x00000212 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ACCELERATOR 0x001aae68 0x00000048 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x001a45c8 0x00000068 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x001a45c8 0x00000068 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x001a45c8 0x00000068 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x001aaeb0 0x00000268 LANG_ENGLISH SUBLANG_ENGLISH_US MS Windows COFF Motorola 68000 object file

Imports

Library KERNEL32.dll:
0x401014 GetCommState
0x401018 GetCurrentProcess
0x401020 GetModuleHandleExW
0x401024 AddConsoleAliasW
0x40102c CreateHardLinkA
0x401030 GetTickCount
0x401040 GetPriorityClass
0x401044 GetVolumePathNameW
0x401048 LoadLibraryW
0x40104c SizeofResource
0x401054 GetNamedPipeInfo
0x401058 GetFileAttributesW
0x40105c SetComputerNameExW
0x401060 MultiByteToWideChar
0x401064 InterlockedExchange
0x40106c GetLastError
0x401070 SetLastError
0x401074 GetProcAddress
0x401078 VirtualAlloc
0x401084 BackupWrite
0x401088 RemoveDirectoryA
0x401090 LoadLibraryA
0x401094 LocalAlloc
0x40109c GetNumberFormatW
0x4010a0 AddAtomW
0x4010a4 RemoveDirectoryW
0x4010ac FoldStringA
0x4010b0 GetOEMCP
0x4010b4 FindNextFileA
0x4010c0 _lopen
0x4010c4 GlobalAddAtomW
0x4010c8 CloseHandle
0x4010cc CreateFileA
0x4010d0 PeekNamedPipe
0x4010d4 WriteConsoleInputW
0x4010d8 PeekConsoleInputW
0x4010e0 SetStdHandle
0x4010e4 SetFilePointer
0x4010e8 HeapFree
0x4010ec GetCommandLineA
0x4010f0 GetStartupInfoA
0x4010f4 GetCPInfo
0x401100 GetACP
0x401104 IsValidCodePage
0x401108 GetModuleHandleW
0x40110c TlsGetValue
0x401110 TlsAlloc
0x401114 TlsSetValue
0x401118 TlsFree
0x40111c GetCurrentThreadId
0x401120 TerminateProcess
0x40112c IsDebuggerPresent
0x401130 HeapAlloc
0x401134 HeapCreate
0x401138 VirtualFree
0x401148 HeapReAlloc
0x40114c WriteFile
0x401150 WideCharToMultiByte
0x401154 GetConsoleCP
0x401158 GetConsoleMode
0x40115c FlushFileBuffers
0x401160 Sleep
0x401164 HeapSize
0x401168 ExitProcess
0x40116c GetStdHandle
0x401170 GetModuleFileNameA
0x401180 SetHandleCount
0x401184 GetFileType
0x40118c GetCurrentProcessId
0x401194 LCMapStringA
0x401198 LCMapStringW
0x40119c GetStringTypeA
0x4011a0 GetStringTypeW
0x4011a4 GetLocaleInfoA
0x4011ac RtlUnwind
0x4011b0 WriteConsoleA
0x4011b4 GetConsoleOutputCP
0x4011b8 WriteConsoleW
Library USER32.dll:
0x4011d0 CharToOemBuffA
0x4011d4 LoadMenuA
Library GDI32.dll:
Library ADVAPI32.dll:
0x401000 RegOpenKeyA
Library SHELL32.dll:
Library ole32.dll:
0x4011dc StringFromIID

!This program cannot be run in DOS mode.
RichJ1
`.data
@.reloc
bad allocation
Unknown exception
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
CorExitProcess
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
CONOUT$
bad allocation
Buvuwadi rogivoz yoyedutezuxuk
Tidevefofogoxa cozivuduy xavexixegukure
Notoreta bejopebodeluk loxirohirubeve nebawicameh
Tilucuk vejotesevidag munarijaraxe
Lobexoxac
bad exception
Lemigig
Pexelubarev
Zupowu naletuyalejozon
msimg32.dll
C:\rubeceji\xoxa63\mazehij-duj.pdb
QQhp,@
D$dPWWW
D$dPWh
VVVVVV
0A@@Ju
Fh=( B
Y;=0&B
teh}K@
<+t(<-t$:
+t HHt
0SSSSS
r=x+B
>=Yt1j
j@j ^V
t"SS9]
0SSSSS
PPPPPPPP
0SSSSS
PPPPPPPP
URPQQhX
t+WWVPV
;t$,v-
UQPXY]Y[
e1n-ub
aOTD>M
f!H.My
Q\rrD/?
"~<-cC.
eY,5e
?Vql\qC
4((<TR
Nl{+_h
'Z#-YY
bV>FBMf
0H]h1|
^xB4wzJ
uut,z>
.EW<G^+T
0hk!n5
6t[wam
AK:mWX
xHk#dy1g
j/%=46
%98n1jx
|SRPCv
(|""p/
u9-%dUq
,$T4;"
pmfD#4
0j%Ikh
'=1|>#
^jIs]N
{<cEoOvW
rxJJYe
i?JfXp
9<5no(
q9@$>>
_}%gyF
2]PP37
ODzJ31
J)/t4$
WUQb&(
VPW%ok
nn:R"('a
GjJ\O9vx
tJj;G`
pi8K([
a<w~BN
f\qKe~
%?p|{l
}%[X{ws
@U4o/5wVG
5JPwNZ
C["IfFHN
R At*h6
jg_LBh
j+n-'C
.3)I&\?
e[Er&{
uD&:Bn
{MncZ@:Y{
.JuNZ6i
eN~}Mm
mQ|H?_
+9eK|r
IcfAPK
w'% um
h=3qeH
F2Nxj6G
c5_K!\
TXm:I|q
^fd%2Y3
t7sL/n~
iAxEPf
/_w[|H
)!tEEH_`
wzYS"T
t *LxRF
~H>w#e
MrL_1j/o$
<DcN|0
t=!]j;I
k"njl"
eVsfp,
iGirRv
l)yQN~
pA_qRX
hO)-s4
x>"8&<CR
>aB*}
P<{Z+\j
U?'[+4w0
wT_aX^
+Grm8D
oSZc3P
k8bIVf
r^%C\q9
`i?GzA[
qG]oM9
\kqGs-
CcULu1"
!]zVk{
$zB11$
:9h<\#
xK0qhD
vJD<wO
PhHM?k
|N!r8i
$VZXSy04{
EJ Y&;
gsYPWw
"`._k=
BP'a"j
$=8xDF
op:XDg
?~*.U-E3
l|?s*S
T94*7d
eH}~P!
R0[@0{%IF
EAA/'\n
[}H1g;
y]}u0yG
Rp?Z\"
`@=Y0lfU&
s5t>#8%
psZ%#Q
f!P}*tj|
IF\73j
SetDefaultCommConfigA
WriteConsoleInputW
PeekNamedPipe
WriteConsoleOutputCharacterA
GetCommState
GetCurrentProcess
GetSystemWindowsDirectoryW
GetModuleHandleExW
AddConsoleAliasW
SetVolumeMountPointW
CreateHardLinkA
GetTickCount
GetConsoleAliasesLengthA
GetWindowsDirectoryA
GetConsoleAliasExesW
GetPriorityClass
GetVolumePathNameW
LoadLibraryW
SizeofResource
GetConsoleAliasExesLengthW
GetNamedPipeInfo
GetFileAttributesW
SetComputerNameExW
MultiByteToWideChar
InterlockedExchange
FillConsoleOutputCharacterW
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
PeekConsoleInputW
BeginUpdateResourceW
BackupWrite
RemoveDirectoryA
EnumSystemCodePagesW
LoadLibraryA
LocalAlloc
SetConsoleCtrlHandler
GetNumberFormatW
AddAtomW
RemoveDirectoryW
BeginUpdateResourceA
FoldStringA
GetOEMCP
FindNextFileA
FindFirstChangeNotificationA
FreeEnvironmentStringsW
_lopen
GlobalAddAtomW
KERNEL32.dll
ChangeDisplaySettingsA
LoadMenuA
CharToOemBuffA
GetWindowTextLengthW
USER32.dll
GetCharABCWidthsFloatA
GetBitmapDimensionEx
GDI32.dll
RegOpenKeyA
ADVAPI32.dll
ExtractAssociatedIconW
SHELL32.dll
StringFromIID
ole32.dll
HeapFree
GetCommandLineA
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
RtlUnwind
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetFilePointer
SetStdHandle
CreateFileA
CloseHandle
.?AVtype_info@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVbad_exception@std@@
.?AVexception@std@@
*******************************************************]
I***********
I*********
*******
sssssssssssssssss
7!!!!!!!!!!!!
*****]z
!!!!!!!!!!!
j!!!!!!!!!!
|||nxxx
"!!!!!!!!!!t
||||x||
^!!!!!!!!!
nnn|||xxx
!!!!!!!!t
||xxx|
j!!!!!!g
nn||||xx
q22222
!!!g!!
nnnnn|||G
P22222
~222222
222222
222222
K|||xxx
|||xx|
nn||||xxx
!!!!!!
nnnn|||xx
]*****
!!!!!!!
!!!!!!!!!
[!!!!!!!!!!!!!!!!
******
!!![!!!!!!!!!!!!d
j[![![!|
*********
[!!!!!!!!!!!!!!x;
*********
![!!![!!!!!!!!
E########5]L*********
!!!!!!!!!!!!!!
L**********
!![!![!!!!!!!jw
**********************
&***********************
OOOOOO
*************************I
)***************************z
Y>***************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************
GGGGGGGGGGGGGGGGGGGG
JJttwww
JJJJtt}
vvvvv,,,,,
TJCCCCCCCCCCC
PPPPPPPPPPPPPP
dBJJJJ
555555
JJJJJJJJJJJ
JJJJJJJJJJJJ
JJJJJJJJJJJJJJJJJJJJJtJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJ
mmmmmmc
'BK""^
:~'11w
}~~zy}
{||}|~z|
~~{~|~
{{~{||
|}z{~{
}|{{~y
~~|}}|
|}z{|~~}
}{~{}~~
~|~~}y
|y}~|}~
z|~}~|
}z{}|}z~
|~}~z}
|z|z}}||
}~~}}z
{}}~z~
~|z}~|
~{~}{~z|
z|{{z~
|~{|z{
{y|~{~
|}|}}y}
{z|~~z|
|}|}||
}{}y~z
{~~}{|
j5'\Hy?
55U4%i2
mmiiAZ
m1Gaz&
=12'Pm
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaa
00000000000000000000000000000000000000
aaaaaa
0......................................0
aaaaaa
0.....
aaaaaa
AAAAAAAA
aaaaaa
AAAAAA
aaaaaa
AAAAAAAAAAA
aaaaaa
AAAAAA
aaaaaa
AAAAAAAAA
aaaaaa
AAAAAAA
Auuuuu
aaaaaa
AAAAAAAAAA
aaaaaa
AAAAAAAAuuuu
aaaaaa
AAAAAAAAAAuuAuuuu
aaaaaa
AAAAAAuAuuuu
aaaaaa
AAAAAAAuAuuuuuu
aaaaaa
AAAAAAAuAuuuuu
aaaaaa
CCAAAuAuAuuuu
aaaaaa
ACAAAAAuAuuA.0
aaaaaa
0.....
CAAAAAAuAuu
aaaaaa
CCAAAAAuAA.0
aaaaaa
0.....
ACAAAAAuA
aaaaaa
0......
CCAAAAAA.0
aaaaaa
0.......
ACAAAAA
aaaaaa
0..........
CCAAAA.0
aaaaaa
0...........
CCAAA.0
aaaaaa
0.........
CCAC.0
aaaaaa
0..............
aaaaaa
0............
aaaaaax
xaaaaaa
aaaaaa
%% rr
aaaaaa
%% rr
aaaaaa
aaaaaa
%% rrr
kaaaaaa
kaaaaa
%%% rr
_pkkaaaaI
eeeeeeGGGG
YYY444
kaaaaaaI
kaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaak
kaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaak
kaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaakkkaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaakaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
D~~~~~~~~~~~~~~~~~~~~~~~~~~.
UUUUUUUU
UUUUUUUUUUUUUUUUUUUU
' # #####
oooooo
ooooooo
ooooooooz
******
f@%CX<
\\iiiiiiiiiiii\\\i
i\\i&&&
i\\i&&&
i\\i&&&&
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
2\2`2d2|2
9 9$9(9,9094989<9@9D9H9L9P9T9X9\9`9d9h9l9p9t9x9|9
: :$:(:,:0:4:
=L=P=X=\=`=d=
>$>4>8>H>L>P>X>p>
>B?S?X?^?c?i?p?u?}?
0$050I0_0o0
1"161<1]1s1
2#2*21282?2F2M2T2[2b2i2p2w2~2
4!4(4-434?4F4O4`4g4
5/5>5D5l5q5v5|5
6S6[6p6{6
=#=5=<=B=T=\=g=
11-161@1t1
374C4V4h4
525[5l5
8)8:8v8
89%909<9Q9X9l9s9
:/:>:E:R:u:
: ;&;B;Z;
<'<_<g<
=%=1=6=;=A=E=K=P=V=[=j=
6E:I:M:Q:U:Y:]:a:e:i:m:q:w:
<9=?=_=
?$?+?D?X?^?g?z?
30S0a0f0
313<3B3H3M3V3s3y3
4*404A4
7M7g7v7
8'818W8
8=;D;o;x;
=6=<=E=L=n=
>$>->C>N>h>t>|>
?(?-?K?
1)1I1N112>2
3 3D3M3T3]3
4'4?4Q4u4
4(5.5G5M5
=;=@=f=
4&686J6l6~6
9C9a9h9l9p9t9x9|9
9F:Q:l:s:x:|:
; ;j;p;t;x;|;
>$>+>2>9>A>I>Q>]>f>k>q>{>
0C0a0h0l0p0t0x0|0
0F1Q1l1s1x1|1
2 2j2p2t2x2|2
8V8c8|8
9B:M:{:
=>B>v>|>
?)?X?f?
1+1G1U1[1k1p1
1;2X2u2
c4(5H5T5p5
686X6d6
7(7H7h7
8(8H8h8
0 0P4H5
6 6$6(6,60686<6
<$<,<4<<<D<L<T<\<d<
= =$=(=,=0=4=8=<=@=D=H=L=P=T=X=\=`=d=h=l=p=
KERNEL32.DLL
mscoree.dll
((((( H
h(((( H
H
japahigocefemajawuberacopas
fosavul
Pijavosepatupam kenib tiduvatabida viranokowis
kernel32.dll
kernel32.dll
Koxejex
VS_VERSION_INFO
StringFileInfo
042230F2
FileDescription
LegalCopyright
Copyright (C) 2022, Fofigraf
OriginalFilename
humanity.exe
ProductsVersion
1.78.4.93
ProductName
Garbager
ProductionVersion
11.95.6.39
VarFileInfo
Translation
LTujurupo rovizomelaweger femovilajehit pojoziza selac tohet pafe xitoxacoxup
Rihuf xetigo nezad
Gujeni xolebod cegalizucaz/Zawo yohagi voliwal dahugedimez kujupokenobubofFBoriceyoloz xacekat jezocofotuliguj gaxodasuvahutiw coxava dolihinecut
Makoboju fijudatep riwimu^Yabupakiv cuf yamemixen xefogojiyi fepajog pamifadonan gazes sovurezoli tonojamesomalu lavumujNLowepivaw jezovalevofumo cepamoyoj ziyigecakorof wevofuziwazelem gorufuguvubox
?Lutufayuhexi sona wogugijasade fokenodorad yuruge rofobemu kima
mVelixuxidid pisuniwovura fiyofuhak kicit diho woriroxoyifuxo cozuwemivon tomidif layovixepohivit xolowupuxehi-Cetabunefiwi xexepizegel xohusegezulepu yipuy+Xuyuxejan mezobobi pegateluluwobi woyewurih Cozeteloli dizetiwoxiy suxewazozKGoxadefu gahoru pip fayokose muz bave badekizizi hasiyolukiyet ceyawi vepob#Velo kale wiy paxemoxadupava gupafa:Cihanepamorif xirufuzisovit nes hinafumereg lopamobixesile&Bolim duseveterafama favizizi hoyinava
Tivumedop fugeted loz
Ditireyu
/Vobeg juy pelipi xezonayovula vuxuzidafo topima/Cinanel motenoju jizuyapiva modepitajogona curi
Jac.Jufozedav vugep fufosobasuwehuy fumixekoyipedu;Gibelusoxosi zoboni rocedonodi fib forecigef wapopamejisifu
Bodiwiwuxiwaz
"Yuhamozifibel juyawocokopinaf vuju
Antivirus Signature
Lionic Clean
Elastic malicious (high confidence)
MicroWorld-eScan Clean
ClamAV Win.Packer.pkr_ce1a-9980177-0
FireEye Generic.mg.c054b59d8acd9409
CAT-QuickHeal Clean
Skyhigh BehavesLike.Win32.Lockbit.dh
McAfee Artemis!C054B59D8ACD
Malwarebytes Clean
Zillya Clean
Sangfor Ransom.Win32.Save.a
K7AntiVirus Trojan ( 005690671 )
BitDefender Clean
K7GW Trojan ( 005690671 )
Cybereason malicious.92b4da
Baidu Clean
VirIT Clean
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 Clean
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky UDS:DangerousObject.Multi.Generic
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Trojan.SmokeLoader!1.EB63 (CLASSIC)
Emsisoft Clean
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
Trapmine malicious.moderate.ml.score
CMC Clean
Sophos ML/PE-A
SentinelOne Static AI - Suspicious PE
GData Clean
Jiangmin Clean
Webroot Clean
Google Detected
Avira Clean
MAX Clean
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Ransom.Win32.STOP.bot!n
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Varist Clean
AhnLab-V3 Clean
Acronis suspicious
BitDefenderTheta Clean
ALYac Clean
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Malware-Cryptor.Grygoryi.3
Cylance unsafe
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Trojan.Win32.Obfuscated.gen
Yandex Clean
Ikarus Trojan.Win32.Crypt
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/GenKryptik.ERHN!tr
AVG RansomX-gen [Ransom]
Avast RansomX-gen [Ransom]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.