Static | ZeroBOX

PE Compile Time

2022-11-21 10:27:32

PDB Path

C:\xelimep46_cileyuyixuguz_rezaza 39\jezay\bi.pdb

PE Imphash

e8b76dfd97b58fcc0350cdefeabf1153

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00020888 0x00020a00 7.70182281587
.data 0x00022000 0x00175ffc 0x00001c00 2.45999300594
.rsrc 0x00198000 0x00013c88 0x00013e00 4.34134454205
.reloc 0x001ac000 0x0000261a 0x00002800 2.44003771941

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x001aa988 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_STRING 0x001ab8e0 0x000003a2 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x001ab8e0 0x000003a2 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x001ab8e0 0x000003a2 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ACCELERATOR 0x001aae68 0x00000048 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x001a45c8 0x00000068 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x001a45c8 0x00000068 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x001a45c8 0x00000068 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x001aaeb0 0x00000260 LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library KERNEL32.dll:
0x401014 GetCommState
0x401018 GetCurrentProcess
0x401020 GetModuleHandleExW
0x401024 WriteConsoleInputA
0x401028 AddConsoleAliasW
0x40102c CreateHardLinkA
0x401030 GetTickCount
0x401040 GetPriorityClass
0x401044 GetVolumePathNameW
0x401048 LoadLibraryW
0x40104c SizeofResource
0x401058 GetNamedPipeInfo
0x40105c SetComputerNameExW
0x401060 MultiByteToWideChar
0x401064 InterlockedExchange
0x401068 GetLastError
0x40106c SetLastError
0x401070 GetProcAddress
0x401074 VirtualAlloc
0x401078 PeekConsoleInputW
0x40107c PeekNamedPipe
0x401080 BackupWrite
0x401084 RemoveDirectoryA
0x40108c LoadLibraryA
0x401090 LocalAlloc
0x401098 GetNumberFormatW
0x40109c AddAtomW
0x4010a0 RemoveDirectoryW
0x4010a8 FoldStringA
0x4010ac GetOEMCP
0x4010b8 FindNextFileW
0x4010bc SetCalendarInfoA
0x4010c0 GlobalAddAtomW
0x4010c4 SetFileAttributesW
0x4010c8 CloseHandle
0x4010cc CreateFileA
0x4010e0 SetStdHandle
0x4010ec HeapFree
0x4010f0 HeapAlloc
0x4010f4 GetModuleHandleW
0x4010f8 Sleep
0x4010fc ExitProcess
0x401100 GetCommandLineA
0x401104 GetStartupInfoA
0x401108 WriteFile
0x40110c GetStdHandle
0x401110 GetModuleFileNameA
0x401114 GetCPInfo
0x401120 GetACP
0x401124 IsValidCodePage
0x401128 TlsGetValue
0x40112c TlsAlloc
0x401130 TlsSetValue
0x401134 TlsFree
0x401138 GetCurrentThreadId
0x40113c TerminateProcess
0x401140 IsDebuggerPresent
0x401144 HeapCreate
0x401148 VirtualFree
0x401158 HeapReAlloc
0x40115c WideCharToMultiByte
0x401160 GetConsoleCP
0x401164 GetConsoleMode
0x401168 FlushFileBuffers
0x40116c HeapSize
0x401180 SetHandleCount
0x401184 GetFileType
0x40118c GetCurrentProcessId
0x401194 LCMapStringA
0x401198 LCMapStringW
0x40119c GetStringTypeA
0x4011a0 GetStringTypeW
0x4011a4 GetLocaleInfoA
0x4011a8 RtlUnwind
0x4011ac WriteConsoleA
0x4011b0 GetConsoleOutputCP
0x4011b4 WriteConsoleW
0x4011b8 SetFilePointer
Library USER32.dll:
0x4011c8 CharToOemBuffA
0x4011cc LoadMenuA
Library GDI32.dll:
Library ADVAPI32.dll:
0x401000 RegOpenKeyA
Library SHELL32.dll:

!This program cannot be run in DOS mode.
`.data
@.reloc
bad allocation
Unknown exception
CorExitProcess
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
CONOUT$
bad allocation
uberacopas
rujehulayafaligubovotodeho
Tidevefofogoxa cozivuduy xavexixegukure
Notoreta bejopebodeluk loxirohirubeve nebawicameh
Tilucuk vejotesevidag munarijaraxe
Lobexoxac
bad exception
Lemigig
Pexelubarev
Zupowu naletuyalejozon
msimg32.dll
C:\xelimep46_cileyuyixuguz_rezaza 39\jezay\bi.pdb
QQh8,@
1u"hp,@
VVVVVV
0A@@Ju
teh8U@
<+t(<-t$:
+t HHt
0SSSSS
uL9=`@B
r=8,B
>=Yt1j
j@j ^V
0SSSSS
0SSSSS
t"SS9]
PPPPPPPP
PPPPPPPP
URPQQh(
t+WWVPV
;t$,v-
UQPXY]Y[
mT0d=l
Bzwx]@
Z7ar7>
bE9Cy`
+gpD^p^
gm&[%`m
k;t}:"
#$UQ&t
zs4|'m
$1C#Na
QS3>59eHJ
UZI.wt
UL03Dy
2zYky@e
%rsPp5
?{vE+<([
Zf2*Hn
(WQ%)7
pzYWUSF
>+_6uD
beRW&}
lu=^vE
e(`scTW[
KcEt,v
wPae'~x
#[fE?m4
3`my~F
*vQ7(L
RLt%=R!
2a*DQm$
;>*i#!N"
^2Y)R
6VAr4nS}
(7aYi
s4Vd^AG
xR.ZRMFVO
L<VZ9J*Du
U)ZCL~
kM8,o
gn4w"Y
/W$aQ;
-0D[^<=i
wiC=6'
z5FMY=3
Pr^FTz
?7L)X7<
c);g=C
h~m-4Q
q?O*~OL%=F
\RF_je
Q|MGQR)Y
'B_tr%
;k;uLI
:z:#yU
p4/&.H
*nJ;lJ
n5>O{wa0}
Q@!}@2
#5F*|V
]!wJO;F
jFMd^WI
r#vDL`OhB
s@]~0+
T~F2Q\
"O%bUA
5FP5KW
p3,cT,
6[)=Dk5
b]FtW_
n]v$J`.
'6c]OkM6
ks AzH
6{;%*@
Um]pJXo
M}Gadi
]gjYFqe/3
DQ6Uqs=:l
r8zQOp
h6Y^{r
3wK2E|
6ly9US
&A_,'jc|
d{:7=g
?vn+i*_
bzJif*O3
l?i*w
+E"OCB8
?Yny7)
`O/nI,.
YCrkj@n
U8-W3]
qB>M/B
f7a-=fv
*,?9x#"
OsPM/1
*[|E9>-
rKoi:r{
8qD$zx
'aKXY_M
1d*lLS
X=T-I"
|& Cq#QH
E2E _OpvQ
?peMD*
rv&0!0!
9bNwaW
#BT] T
hF/]es
<DB0.
-$i+N.P
t$'FU
<@ksK=b
bOKo4JxN
NAL~zk
?UBixx
.I%0HE
IfNC^
t~^4~_
}'9A'b
o&{HN3
Dh4bl.
':!(;Bp
Dyx_{+
{j[s2:bb
U-t$Ywg
:Z>SH-
u,\=:^
5$TgMV
vwJn]@
&{fc.\e
]wZ`:d
5Sa)o
68qCN-#R
iQl%yl
%0h\eN7KN
_H0*b)
6ils2J
Bn<*2O
sefjtD
a(es)pp
FillConsoleOutputCharacterA
SetDefaultCommConfigA
WriteConsoleOutputCharacterW
PeekNamedPipe
GetCommState
GetCurrentProcess
GetSystemWindowsDirectoryW
GetModuleHandleExW
WriteConsoleInputA
AddConsoleAliasW
CreateHardLinkA
GetTickCount
GetConsoleAliasesLengthA
GetWindowsDirectoryA
GetConsoleAliasExesW
GetPriorityClass
GetVolumePathNameW
LoadLibraryW
SizeofResource
SetVolumeMountPointA
GetConsoleAliasExesLengthW
GetNamedPipeInfo
SetComputerNameExW
MultiByteToWideChar
InterlockedExchange
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
PeekConsoleInputW
BeginUpdateResourceW
BackupWrite
RemoveDirectoryA
EnumSystemCodePagesW
LoadLibraryA
LocalAlloc
SetConsoleCtrlHandler
GetNumberFormatW
AddAtomW
RemoveDirectoryW
BeginUpdateResourceA
FoldStringA
GetOEMCP
FindFirstChangeNotificationA
FreeEnvironmentStringsW
FindNextFileW
SetCalendarInfoA
GlobalAddAtomW
SetFileAttributesW
KERNEL32.dll
ChangeDisplaySettingsA
LoadMenuA
CharToOemBuffA
GetWindowTextLengthW
USER32.dll
GetCharABCWidthsFloatA
GetBitmapDimensionEx
GDI32.dll
RegOpenKeyA
ADVAPI32.dll
ExtractAssociatedIconW
SHELL32.dll
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
HeapAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
GetStartupInfoA
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetFilePointer
SetStdHandle
CreateFileA
CloseHandle
.?AVtype_info@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVbad_exception@std@@
.?AVexception@std@@
0000000000000000000000000000000000
zzzhhh-x
x------------30
-----------
----------
---------->0
X---------
P-------->0
------
cS?????k
??????
eHq??????
+e^5z-z
??????
}0000000
11111e
66666666
-V--f-V-VVVVVVVV--
-f-V-f-VVV-V-VVVVV
---V------VV-V-V-V]
-------V---------P
h----------------
---h------------&
h-h-h-2r
Fh--------------
F-h---h--------V
1--------------
F--h--h-------
))))))))))v
hhhhhhhhhhhhhhhhhhhhhh@
Dt/"fO
h7ziii
h7p3333
:::::::::::
W}Uhhhhhh
hhhhhhhhg
SWWWWWWWWWWWWWWWS
______________
OOOOOM
r%OOOM
fffffff
SWWWW~
bbbbbbbbbb
}}{~}~z
}|~|}y|
zz{}~|~
|}~~~}~z}
|~|~{~
{z}|{~
y{~~|}
{|~{z}{}
z{}{z|~|
zzz~z}
~y{}{}
{~|z|z{
}|zy~}
||}{~{
{z||z|
|{|z|}}
{}~~}y
|~}~{~}}{~}
{|}|}|
{{yzz{
~y||~~|
{}|{~}
{~~~{||
}}{}|~
}~}z~y
"`HIH`
p`XHH#%E
`] p`"%
cQ#` `]
d%d?%?
qSq|5q5555
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXX
XXXXXX
XXXXXX
XXXXXX
e)XXXXXX]N
4aSjXXXXXX
XXXXXX
9XXXXX9
LXXXX)
BxXXXXXX}
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
;;;;;(;(;((((((((((((((((((((((((((((;
;(((((
;(((((((
;(((((
;;((((((((
;;((((((
;;;((((((((((
;;;;;((((((
;;;;(;(((((((
;;;;;(;(((((((
;;;;;;(;((((((j@
;;;;;;;(;((((((j@
;;;;;;;;;;((((((j@
;;;;;;;;;;;((((((j@
;;;;;;;;;(;;((((((j@
;;;;;;;;;;;;;;(((((j@
;;;;;;;;;;;;((;(;(((j@
888|""
r~~:::
18||""
~~~:::
88||""
pppppppppppppppppppppppppppppppppp
QQQQQQQQQQQQQQQQQQQQQQQQQ
MMMMMMMMMMMMMM
*******M
MMMMMM?
MMMMMMM
MMMMMM
MMMMMB
MMMMMx
N4pppp0
~pppp0
N<OO^`YUrppp
ppppppppppppppppppppppppppp
ppppppppppppppppppppppppppppprrpppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppp
TTTTTT
TTT)ZZ<
XeeWaI
XeeWaI
111111111111
1@@@@@@@@@@@@1
144444
14444444OF
GGGGGGGGG<F
GGGGGGGGGGG
2L2P2T2l2p28:<:
9 9$9(9,9094989<9@9D9H9L9P9T9X9\9`9d9h9l9p9t9x9|9
: :$:(:,:0:4:8:<:@:D:H:L:P:T:X:\:`:d:h:l:p:t:x:|:
= =$=(=,=
>$><>L>P>X>p>
?$?)?/?4?:?A?F?N?a?p?
010B0V0o0|0
1"1D1\1{1
2 2'2.252<2C2J2Q2X2_2f2m2t2{2
3X3b3i3n3{3
4-444P4V4
52575<5B5O5U5`5h5
60787M7X7
9J:P:p:
?8?>?G?N?p?
0&0/0E0P0j0v0~0
11*1/1M1
2=2Q2c2j2p2
3S4X4]4b4r4
4@5E5L5Q5X5]5
7J7O7w7
:/;:;D;];g;z;
>#>>>F>N>e>~>
112_2e2p2|2
3'3.3F3R3X3d3s3y3
404E4k4
6"6l6s6
7%7;7F7K7V7[7f7k7x7
7p8f9n9!:
;D<J<Z<
4 4$4(4,494K4
5'545O5V5n5
5"7'757B7I7S7}7
89;G;M;g;l;{;
<!<'<1<8<L<S<Y<g<n<s<|<
6V6\6h6
8:8*9S9
0.0=0J0V0f0m0|0
1Q1`1i1
464?4K4
>3>>>U>a>n>u>
?@?Y?g?{?
+030s0}0
2=2E273
3*4_4x4
5 5$5n5t5x5|5
6 6A6k6
8!8/8o8
:N:T:Z:`:f:l:s:z:
;;%;;;B;q;
>Z?d?|?
3:3L3^3p3
3Y4 6Z6
71787<7@7D7H7L7P7T7
8!8<8C8H8L8P8q8
8:9@9D9H9L9
;5;?;H;S;h;o;u;
030?0f0s0x0
3$3u3{3
4O4G6d6
: :@:\:`:h:l:
;0;<;X;x;
<4<8<T<X<t<x<
0$0(040<0D0L0T0\0d0l0t0|0
9X<`<d<h<l<p<t<x<|<
= =$=(=,=0=4=8=<=@=D=H=L=P=T=X=\=`=d=h=l=p=t=x=|=
mscoree.dll
KERNEL32.DLL
((((( H
h(((( H
H
lPijavosepatupam kenib tiduvatabida viranokowis
dutezuxuk
kernel32.dll
kernel32.dll
Koxejex
VS_VERSION_INFO
StringFileInfo
042230F2
FileDescription
Banzay
LegalCopyright
Copyright (C) 2022, Fofigraf
OriginalFilename
glits.exe
ProductsVersion
1.78.4.93
ProductName
Cascade
ProductionVersion
11.95.6.19
VarFileInfo
Translation
Fegafofuv7Cow tucajofemeze wirimuduteg tavukutesedey gutid yitehoFebumac fiziji bimiruke jitayos Fewile hoduxiwim nexo cotes calo
Pawadetug
Varohoyesar duvi pefezuvuvabe*Xip mofijanilecezo fufuxin basi gidotorayo(Zigawi hibeziw pununawik lode cocukuluje
]Xigahaguwonowon zimefahif nacaxos vuyibisukoc jek sanireguga girecivawahug gomixi huxey camot
Jufupupezunile gaxekemutuxevMPadipibetucah noh xomogukesikaduw fotehayolohit wovigatibobole kagew doxozetieZujuduruxo dufexoyevaniluf puhayesanedabo fewomapuxuh lowopuyuhiso dibukax wevapujetuwubom yuvixixepa/Fuvamuremejaj xigu goyihogadofow defukahu bafatnRerofezovu rux yexosabofafas zukomiwitovejop lelizusodurifuz paharuramoje zabibojunuyena nakuz wifunizayinoreh
FivikiiTamubegesuxiyoz ditatibeka yapuhogiluva pulo kapenuyanay tupuyohi wugug cabaxebatemecuy lowifoc bomuraluh{Nonigucuw cadozeheci seruwedezacihih vojuwucu tolavinawalafot leye puwelumoxegogi rawarogebeyigo nahuyiseyuj gipufoxuvadari
Pecekewocovuj
Dih loyudolewiwul
_Porojihusifutuk hir tuyesusuyevu huhiniyo niwakicayuyev jofeb giyazutakipolec gawili wibol xedu
Ricogerocegix zesufimimeyixetATufas nif citolez refonarigolohe dof gijufoko gahoyexe gos koboca[Vapakayem zamejinuku com pisohiciso satiri biloy decuco vebomewexixap hohabe pocivojocikucoNXuc cutucuridepicaz fipidu wahocahorobuw vesocinodani dero lamuvaroxeneka suboCKefapakuta ner wiyepaxez wowilakisutecit nuketun konocajebi huzebif
Taj dan yivowiro gujokel
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
tehtris Clean
MicroWorld-eScan Trojan.GenericKD.69851339
FireEye Generic.mg.834f8d3c68e80cb0
CAT-QuickHeal Clean
Skyhigh BehavesLike.Win32.Lockbit.dh
ALYac Clean
Malwarebytes Trojan.MalPack.GS
Zillya Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 005a23a61 )
BitDefender Trojan.GenericKD.69851339
K7GW Trojan ( 005a23a61 )
CrowdStrike win/malicious_confidence_100% (W)
Baidu Clean
VirIT Clean
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Kryptik.HUZL
APEX Malicious
Paloalto Clean
ClamAV Win.Packer.pkr_ce1a-9980177-0
Kaspersky HEUR:Backdoor.Win32.Androm.gen
Alibaba Trojan:Win32/Generic.5be6e2de
NANO-Antivirus Clean
ViRobot Clean
TACHYON Clean
Sophos Troj/Krypt-VK
F-Secure Clean
DrWeb Clean
VIPRE Trojan.GenericKD.69851782
TrendMicro Clean
Trapmine malicious.high.ml.score
CMC Clean
Emsisoft Trojan.GenericKD.69851339 (B)
Ikarus Trojan.Win32.Crypt
Jiangmin Clean
Webroot W32.Dropper.Smokeloader
Google Detected
Avira Clean
Varist W32/Kryptik.KWO.gen!Eldorado
Antiy-AVL Trojan/Win32.Kryptik
Kingsoft malware.kb.a.1000
Gridinsoft Ransom.Win32.STOP.bot!n
Xcitium Clean
Arcabit Trojan.Generic.D429DA86
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Backdoor.Win32.Androm.gen
GData Trojan.GenericKD.69851339
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.PWSX-gen.R613165
Acronis suspicious
BitDefenderTheta Clean
MAX malware (ai score=86)
DeepInstinct MALICIOUS
VBA32 Malware-Cryptor.Grygoryi.3
Cylance unsafe
Panda Trj/Genetic.gen
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002H07JH23
Tencent Clean
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/GenKryptik.ERHN!tr
AVG Win32:PWSX-gen [Trj]
Cybereason malicious.ac0c94
Avast Win32:PWSX-gen [Trj]
No IRMA results available.