Static | ZeroBOX

PE Compile Time

2023-05-13 12:08:17

PDB Path

F:\远控源码\C++控件版-远控源码\winos全文件源码\cangku\WinOsClientProject\Release\上线模块.pdb

PE Imphash

35df1e9438f71df442de46ffe74e70c9

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0005b814 0x0005ba00 7.56594718512
.rdata 0x0005d000 0x0000b58c 0x0000b600 5.9273994925
.data 0x00069000 0x00009fc8 0x00005200 2.80197759522
.rsrc 0x00073000 0x000001b4 0x00000200 5.11429298893
.reloc 0x00074000 0x00005ace 0x00005c00 3.68814524457

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x00073058 0x0000015a LANG_ENGLISH SUBLANG_ENGLISH_US ASCII text, with CRLF line terminators

Imports

Library KERNEL32.dll:
0x1005d050 Process32FirstW
0x1005d054 Process32NextW
0x1005d058 CloseHandle
0x1005d05c LoadLibraryW
0x1005d060 GetProcAddress
0x1005d064 CreateFileW
0x1005d068 GetCurrentProcess
0x1005d06c lstrcpyW
0x1005d070 GetLastError
0x1005d074 HeapAlloc
0x1005d078 GetProcessHeap
0x1005d07c HeapFree
0x1005d080 OpenProcess
0x1005d084 GetDriveTypeW
0x1005d088 GetDiskFreeSpaceExW
0x1005d08c GlobalMemoryStatusEx
0x1005d090 GetSystemInfo
0x1005d094 FreeLibrary
0x1005d098 GetModuleFileNameW
0x1005d09c GetCommandLineW
0x1005d0a0 GetStartupInfoW
0x1005d0a4 CreateProcessW
0x1005d0a8 ExitProcess
0x1005d0ac WideCharToMultiByte
0x1005d0b0 CreateFileA
0x1005d0b4 DeviceIoControl
0x1005d0bc CreateEventW
0x1005d0c0 SetEvent
0x1005d0c4 ResetEvent
0x1005d0cc WaitForSingleObject
0x1005d0d0 InterlockedExchange
0x1005d0d4 WriteFile
0x1005d0dc CopyFileW
0x1005d0e0 SetFileAttributesW
0x1005d0e4 GetConsoleWindow
0x1005d0e8 CreateEventA
0x1005d0ec FormatMessageW
0x1005d0f0 SetLastError
0x1005d0f4 VirtualProtect
0x1005d0f8 IsBadReadPtr
0x1005d0fc LoadLibraryA
0x1005d100 GetNativeSystemInfo
0x1005d104 CreateThread
0x1005d108 SetErrorMode
0x1005d110 CreateMutexW
0x1005d114 GetFileSize
0x1005d118 DeleteFileW
0x1005d11c ReleaseMutex
0x1005d120 SetFilePointer
0x1005d124 RaiseException
0x1005d128 LocalFree
0x1005d12c ReadFile
0x1005d130 LCMapStringW
0x1005d134 FlushFileBuffers
0x1005d138 SetStdHandle
0x1005d13c WriteConsoleW
0x1005d144 GetEnvironmentStringsW
0x1005d148 GetModuleHandleW
0x1005d14c lstrcmpW
0x1005d150 GetTickCount
0x1005d154 Sleep
0x1005d158 lstrcatW
0x1005d15c GetSystemDirectoryW
0x1005d160 GetLocaleInfoW
0x1005d164 GetLocalTime
0x1005d168 GetCurrentProcessId
0x1005d16c MultiByteToWideChar
0x1005d170 lstrlenW
0x1005d174 InterlockedDecrement
0x1005d178 VirtualAlloc
0x1005d17c LeaveCriticalSection
0x1005d180 EnterCriticalSection
0x1005d184 DeleteCriticalSection
0x1005d188 VirtualFree
0x1005d190 GetModuleFileNameA
0x1005d194 GetFileType
0x1005d198 SetHandleCount
0x1005d19c IsValidCodePage
0x1005d1a0 GetOEMCP
0x1005d1a4 GetACP
0x1005d1a8 GetCPInfo
0x1005d1b0 GetFileAttributesW
0x1005d1b8 GetCurrentThreadId
0x1005d1bc HeapCreate
0x1005d1c0 HeapDestroy
0x1005d1c4 CreateWaitableTimerW
0x1005d1c8 GetStringTypeW
0x1005d1cc HeapSize
0x1005d1d0 GetConsoleMode
0x1005d1d4 GetConsoleCP
0x1005d1d8 GetStdHandle
0x1005d1dc TlsFree
0x1005d1e0 TlsSetValue
0x1005d1e4 TlsGetValue
0x1005d1e8 TlsAlloc
0x1005d1f0 IsDebuggerPresent
0x1005d1f8 TerminateProcess
0x1005d1fc RtlUnwind
0x1005d200 GetCommandLineA
0x1005d204 HeapReAlloc
0x1005d208 ExitThread
0x1005d20c EncodePointer
0x1005d210 DecodePointer
0x1005d218 CancelWaitableTimer
0x1005d21c SetWaitableTimer
0x1005d220 lstrlenA
0x1005d224 UnmapViewOfFile
0x1005d228 SwitchToThread
0x1005d22c CreateFileMappingW
0x1005d230 MapViewOfFileEx
0x1005d234 InterlockedIncrement
Library USER32.dll:
0x1005d278 PeekMessageW
0x1005d280 GetWindowTextW
0x1005d284 GetMonitorInfoW
0x1005d288 EnumDisplayMonitors
0x1005d28c GetForegroundWindow
0x1005d290 SendMessageW
0x1005d294 FindWindowA
0x1005d298 GetWindowTextA
0x1005d29c GetWindow
0x1005d2a0 GetClassNameA
0x1005d2a4 OpenWindowStationW
0x1005d2ac IsWindow
0x1005d2b0 GetLastInputInfo
0x1005d2b4 DispatchMessageW
0x1005d2b8 TranslateMessage
0x1005d2bc wsprintfW
Library ADVAPI32.dll:
0x1005d000 OpenProcessToken
0x1005d004 RegSetValueExW
0x1005d008 RegCreateKeyW
0x1005d00c RegDeleteValueW
0x1005d010 RegQueryValueExW
0x1005d014 RegOpenKeyExW
0x1005d018 LookupAccountSidW
0x1005d01c GetTokenInformation
0x1005d020 GetCurrentHwProfileW
0x1005d024 FreeSid
0x1005d028 CheckTokenMembership
0x1005d030 RegCloseKey
0x1005d034 RegEnumKeyExA
0x1005d038 RegQueryInfoKeyW
0x1005d03c RegOpenKeyExA
Library SHELL32.dll:
0x1005d260 SHGetFolderPathW
Library ole32.dll:
0x1005d350 CoUninitialize
0x1005d354 CoInitializeEx
0x1005d358 CoInitializeSecurity
0x1005d35c CoCreateInstance
0x1005d360 CoInitialize
Library OLEAUT32.dll:
0x1005d248 VariantInit
0x1005d24c SysFreeString
0x1005d250 SysStringLen
0x1005d254 VariantClear
0x1005d258 SysAllocString
Library WS2_32.dll:
0x1005d2d8 getsockname
0x1005d2dc WSAAddressToStringW
0x1005d2e0 WSASetLastError
0x1005d2e4 WSAStringToAddressW
0x1005d2e8 closesocket
0x1005d2ec send
0x1005d2f0 setsockopt
0x1005d2f4 WSAIoctl
0x1005d2f8 htons
0x1005d2fc WSAGetLastError
0x1005d300 inet_ntoa
0x1005d304 gethostbyname
0x1005d308 gethostname
0x1005d30c freeaddrinfo
0x1005d310 getaddrinfo
0x1005d314 WSAStartup
0x1005d318 WSAResetEvent
0x1005d31c WSAEventSelect
0x1005d320 WSACleanup
0x1005d324 bind
0x1005d328 connect
0x1005d32c recv
0x1005d330 WSACloseEvent
0x1005d334 WSACreateEvent
0x1005d338 socket
0x1005d33c WSAEnumNetworkEvents
0x1005d344 shutdown
0x1005d348 ntohs
Library SHLWAPI.dll:
0x1005d268 StrChrW
0x1005d26c StrPBrkW
0x1005d270 PathIsDirectoryA
Library NETAPI32.dll:
0x1005d240 NetWkstaGetInfo
Library DINPUT8.dll:
0x1005d044 DirectInput8Create
Library WINMM.dll:
0x1005d2c4 timeGetDevCaps
0x1005d2c8 timeEndPeriod
0x1005d2cc timeBeginPeriod
0x1005d2d0 timeGetTime

Exports

Ordinal Address Name
1 0x10009a20 GetInstallDetailsPayload
2 0x10009a20 SignalChromeElf
3 0x10009a70 Version
4 0x10009950 load
5 0x100099c0 run
!This program cannot be run in DOS mode.
`.rdata
@.data
@.reloc
L$t_^3
RPQhPK
PRCSh0v
SVWh2u
tkHt@H
T$(PQR
D$ QRP
)_p)_l)_\
^l+^\+
Nlf+Np
Vlf+Vd
O(9O$u
^(9^$u
~49F4u
w@;N(w;
ND;H s
ND;H(s
Nl;N`sN
Fl9Flr
@PAQBR
t!VFVS
Nd;N<sH
C@9CDv
+^tx<=X
+S(xM@
S4;V|r
+xT_^x
Nd;N<r
Vd;V<sM
Fd;F<s
~<WRQP
9^$uh
9^$u/h
u<;~ u0
u)jAXf;
QQSVWd
tWItHIt9It
^SSSSS
j@j ^V
t=MOC
HtHu4j
t*=RCC
;7|G;p
tR99u2
tUjXXf;
ou-j8Xf;
UVVVVV
HHtXHHt
?If90t
URPQQhp9
t"SS9] u
PPPPPPPP
PPPPPPPP
;t$,v-
UQPXY]Y[
<+t"<-t
+t HHt
rocA9F
LoadLibraryA
GlobalAlloc
VirtualAlloc
This pr9og
0P.t9ex
`.rdat
GHP7S(~l
S,VW#a1E
[hx,!p
R_7 76
]G ':
+VRl6!L)7
'%J|A
t$ >z(!
NeFR#N
'A"@$T
:W0?Xa],3
/%%aNp
UQPXY]
w<Bx!p=B,
BW"_}o
@f#2Q4OA
rv?tjS
q0bt,b
rOb,DvJV4
"gZ6I8
C nviH]
?kPF0^t
)?{l])^
~Sk`H3_
9"EDuQ
wCE6U}
UAtGh/P
7IT2ddL=
Pr:jph
Ziw$53
*h>*Y_
+YEfW\
6M2~u/
lZPjdN
y)[sJ+
!pRu5
0^$h@K
$\p]dtE
So$-Y>C"X
?1O|6Y
u%K(U4
tRw3!EC
&keheS
*0#{%-
%V41!HWE
zC+e"82
QPT2.8
Q1Rt-*
V!FEpRp
qqh1#1a
a|*BZ1
WQ_ 78z(
C8u6+u*
s: &dtF
P$+Q89
+B)U'LX
b^{f)
.0!XatN
R4grqEGuL-
yN!1j!t1sXu
eIm%e>
`#0$pA
*t6IH4
'}8DiT
?O"BIX
NfL3"$+5
8=yDB8
yG^@!6O
>@kU[;+
b0EE,J
4(s UA
M`Z49,
ix=RhPA
s4Z$i$
Z0iIh*
k8H0'4h
|^yBS_7_
iu3hV
C97?7<
(7Es@)
+RM`/T
C&/io2
!`YW#
njS Jcg
33cv2t*
Bv!0nV+`/
"`{%m/
I~#hl[9
7"Y[}U
B o+#w
$G\P\&
-JQkhU
d7r<`.
]:M]e0
#"ZlS0
'5z0/.
.w#9Z)1p
;Q~s0MR
rdQICz
,#h'q
|0q |~
`Iv_O:EP<
$PFmyr
Uthw*V
MP@0(w
^oTLN/
0:r&hX
")zfM+}
(;Q"vCJ
I!-&w$pp
H%*K!H
s,!)O1
EC(Sdo+)
"n)_~%
8Pfqi=
Pg~!-OF
*jEBoJ
Bx7K_U
>nUbf(euQXN
AK?I# M
&AEd94
%Qf%Q^
5gYPCp
s"KEFB
BXXI0lu
i;xTAbQ
%{`Z6p
t=lE_rY*
V|Dh"U
J 9$("3
/U4)^%
@zqBBd
X#X! O4
9&s#(
S+CoEQ
6"HDXj
X" D|
_AbasedD
*biHww?ft
]uI{ug
n8^NN>2\8xZ
, ()D~^
cermQn
0py?);`
tgppTc
iP>pmfs
,ye% hr:2$0Y
aVJ`pdo_
*o I_L
y3J(e9dt
daM:K"
8-:W,h
6jtUsRt
*s^Jg9
e@TJl%PQ "E
vR\RDx
7,, BZ
bCR`tI6gn
%>hsfTn
B/`/0x%p
JJNt|v
)ypS|@
%8'~C4
AP COR
iv&3Iury@*
c<j>iW
p}{zld}
Kdb>i+e
JfbhbGn
&$Q(26
6U`#r&
reH=I|
s]5D%^
oBOkHJ
-%(?BhADv
V*KrF^%)|
bq^#Ht
(4L)as8
]'VHzuN
4KF0Ns
 !"#$%&
'()*+,-.
/0123456
fghijkl
mnopqrst
uvwxyz[\
FGHIJKLM
NOPQRSTU
VWXYZdj R
S8atg9dwy
N8ov>Dy
eyH(uh
d"hDlt
H"LDP\
X"`Dhp
%elR\7
&(lUKm
T""p+U0
&0<dcKa
YU{b~p
T*'`^ C;hay
DbgRepo
IO8yL,:
!"8D"L
#&@!D$H
P"&DX'
p"+Dx,
Z"8De@
6"LD7X
0"ND<O
`"VDlW
/LdSjX8k!o
,Sz8-u1
8Si()s
* Uy*:
p-pSMA
TI7`RPr
pbWnxM
eYkK<@
H22eP)
'`,XX[,,E4[La4
WG|e0Uv|
DT|YHrP
fFd8D!ZgM
dWML8J|
0SO4!nZj
IKH-R4
L(Lp!j
?b$0&X!D
"2l!d&x
3&\!Zz
!yem,xo
Jm<.30e
iyu*8dm
8!veu,
(rtLS'
xwQ<HhKtv]
NI<s|t
@b;zO]
-G 8
i_6bJ"
S_dIID> LDL
dK4'0\N
y6otQC
8rL yd0
l,p\/i(
4RT("(B
$0O1&<)!
ETUPrA
wi8>s&S
By$xT}<i
-Si= ]
LWy~l0$
Y8z2(2
v_xjB2
.?AVbad_
mblyg
2uvrw:6ch(2t-yi
7:"A.v1
C<tru[0P
uiAc0D
:';]<k=q>w?}?
9<&:g;
95):2;H<R=[>
t&vHxgzlIx
Z/Gigt
L95U:a
:99Y:c;
V>[?p1
2907:@;j<o&t
H1M'_E
%:*'/G
8rCtLvXTa
N99S:};
4('-D?
evxVzo|
' GZg_
92":+;U<Z=_
;W<\=aT
.xezq|
$6<A D,
<r!t-vZx_Kd#
@<D'HGLgP
99 :$;(<,=0>4?8?
>$')GHgL
0\?r#J(
&@i8P=
]z;a<m=
4r@tLvi]uB'
62r@ZF
>r/t4v@xmzr|w
tvLx~z
2=S>['d
#9<6:Y;
H'MGVg
9=$:C;b
3rt(]
v]xbzg
'"GJdS
"91'.,
283xl]m
X@rfDk
^IZhp,~
x<vQgZ
`xXz]|
'6G;g@
Jh5rm_
9=":-;B%
-95G$T4
p9Nu";<
>pXP.x`
`Xb~p[x
>0%8aXH
x z(]0
IB$$D,
LILN$TP
tIT|$V
mwH|Hprt,N4
< =('0A
H8P?X?`/h
PXD~`^h
*~H~P~X~`~h~p[x
~@~H~P
rocA9F
LoadLibraryA
GlobalAlloc
VirtualAlloc
This pr9og
0P.t9ex
`.rdat
SVW0#1E
hhKSC.
I`4jJn-
I-ZH7N
l`ytb
SO1`-j
UQPXY]
#2Q'4A
:>J``
B@v4lb
*h=gL]
U(2AMa.+
%uNz\Sxi
kx5PCe9
;*aBu!RR
{&QyRFvB
biF4)aZ
Z;)*owc
{N$lpA[
JpUF=#
E"uEQ"
'X( N8$
w UtGh
FkPPE^
7M00(
/m E
Pr:jphX
v,VHIS).
*4>,*_
EQ)H ^
YpIU$B
;AsYk=
}*p%#6
"k=Cg6>G)
(-H;QI
{,B0VV'y
Q&& U&
HU"hXt
/DJP:,
\p2]t"
p#@Dy,
Q*P2.G8A
*-B1rT
5.d!Pd
:~RVH!
c"Q0DP
Q@OkQ"
^{3)Z
0,!a't
gr8EGu
i'ait*K
KjNUy
UWt}'w
Jp'DEV
Q 'VQx
J-8teo
aB6$+z
#-AB6$+Z
lG~ 2K
,v> :_
HEz^&# h
fj^='U
W3Ef9:
yQ HvS>
.wWX}9~
s:utrx
bR$ 0k!
#fD:y1
jn=kQb2ut
'}e<{[
vPX%(
:#@D l`
yGU0#
9Phb0d-
pI~#h-l9
@k+00&
BF%$TA
|Js7QPh
uOd0-X
Bl7#T8
BPvOp')
#8%]4Rw
mi>Uq9R
buCtcB
4/=@yX
RP\V@
d?x@DH
qdBP~eR
R(AhdJY3'
>"lZQ1k
^b;ztCW
)sMR'W
_1S;Vw
qx(LRT
f=V^SP
}/Yyi
a=(Q*B
TM_">.D
ziddY9
0(RwiQ
zCd"xv;
\po}fT9
PR@|'Q
DdZxYT`&
(rRb/A
4r'+dT
RVO=dv|
{6|S^9*p
m82tPF
3~8(f4q=
'I3TBo%
2=TzIWh't
WMG%UI
jE!o%_
|Z !}"
Bo_|^u])
nU1f(e:
C~XG'C
?srUM?
=B5u%8
5_%@y)
POSC@t
9WyBE3
OwY-J^W
L!Uy K?
.%Z7P=
{W^u])eGVd
)K[;F!PtA
\#x%I
BQX}~
B`R)s)
dPV) 2},
_f,M>Q
T5hRwN
NBxANX
'3Xop[)
s_dmHT
<[ xUR
H"XDjz
2"LDfx
)T@D:\a
Jh0dpH
N_ based
()"~d^
c9em(n
?aHgaEJ=
i(>8m3s
J8`d7_
$WBet<
$fXj@N
ewqsKLy
Jvbdpsf%
Qd3T&k
J* $v2hr
b TOd&
CorEPPvP
>HY<Kb
v)\)D<]4
%hs3Tn
yK*i&X
/0x%~pywRs-
%Nt;|F$
EAP COR
?hRIdd
^I$|KKl
%oqb$#
->(#LF
su_b[v
%s[@9Z
d[h/FL
%f1hb#n
tI(<xV
It*Y)'tFR
8rOZ+>W$
(nul-)
e{pS|&
^g2amWD
&m2m1:
Vfq<:%
h<U%|bZ]
XxwvbW
$`LCMaHp
_eNxUzT
 !"#$%
&'()*+,-
./012345
6789:;
fghijk
lmnopqrs
tuvwxyz[
\]^_`j
U`ABCD
EFGHIJKL
MNOPQRST
UVWXYZ25 )
Sat39d
NovD<
tTBvxa
h"lDt|
L"PD\p
`"hDpx
,"@DHP
S@-Lzv
INF@Hn
Qy7 Yv
02<c%a
DbgRepho
:&\hB.
|P$`iU
KLib(dBP
8ZCC<@x
@"!$dH
&"XD'`
L"7DX8
N"<DOH
V"lDWx
@So8)i(
8-8S&A
Y7\@TI
T7l@TR
rYsK<*m0CM)c
$slYm#To
a4[L14
|eDT,|H
WAXdHC
$pALR(
'!el\D*
L(&p!Oj
+&(!Dm4
-!VLtD
\-!zLDD@h
8j!ogk
sYzKle
!0Dd=~
p/0h10
l%\Bzwq
b%"v S
&DLda
|kA|x]IYp'V
nJeIAW
r4 C2N
DN4$a$
exWp@^
X6>I@R
otQDC8r
3d!lG( _=
PRerl:as
cfg2p!
T$XWA4dm
rtc$&3h
ed>+tL
WQNkwF
wip|sMS
ByxHT}x
bx%d}4
?AVbad_{
UTF-8K"
l3Be&y
clh(2-
~tVns8
cdP/0v
t'v]xkzq|w~}~
<r&tgv
5r)t2vHxRz[|
2d'qGwe
L5rUta
:9rYtcv
CMph=z>
:;I<P=
zV|[~pc
20r7t@vjxoMt
`;3<;=A$hv
N9rSt}v
,90i:n;z<
2r"t+vUxZz_
vWx\za
<1w'|O]
'GOgT
@:DKH%
9r t$v(x,z0|4~8~
81\qvC
<a={M}p
:&"2zS|[Nd
#<r6tYv
=r$tCvb
x9?}\.
7!'-GZg_
"1r'],
*;M<W.
\"[N.k
=r"t-vBK
1$%2)abb
E8D=O>
-5rGIT4<
^KcAFz;
=H>P?X?`?h?p'x
$ID,-F
BH<IJD$LL
NITP"dIlR$tT
x z(N0
HpP~X~`^h
Q1.2.11
deflate 1.2.11 Copyright 1995-2017 Jean-loup Gailly and Mark Adler
1.2.11
incorrect length check
incorrect data check
invalid distance too far back
invalid distance code
invalid literal/length code
invalid distances set
invalid literal/lengths set
invalid bit length repeat
invalid code -- missing end-of-block
too many length or distance symbols
invalid code lengths set
invalid stored block lengths
invalid block type
header crc mismatch
unknown header flags set
incorrect header check
invalid window size
unknown compression method
Qkkbal
[-&LMb#{'
w+OQvr
INSKyu
)\ZEo^m/
H*0"ZOW
mj>zjZ
IiGM>nw
ewh/?y
OZw3(?
V_:X1:
incompatible version
buffer error
insufficient memory
data error
stream error
file error
stream end
need dictionary
inflate 1.2.11 Copyright 1995-2017 Mark Adler
bad allocation
CTcpPackClientT<class CTcpClient>::CheckParams
CreateFileTransactedW
[RO] %ld bytes
input wins: %lu
input probe
input psh: sn=%lu ts=%lu
input ack: sn=%lu rtt=%ld rto=%ld
[RI] %d bytes
recv sn=%lu
%s --> Error: %d, EC: %d
<C-CNNID: %Iu> OnReceive() event return 'HR_ERROR', connection will be closed !
<C-CNNID: %Iu> OnSend() event should not return 'HR_ERROR' !!
---------------> Client Worker Thread 0x%08X stoped <---------------
---------------> Client Worker Thread 0x%08X started <---------------
<C-CNNID: %Iu> send 0 bytes (detect package)
<C-CNNID: %Iu> recv 0 bytes (detect package)
Unknown exception
CorExitProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
bad exception
(null)
`h````
xpxxxx
_nextafter
_hypot
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__eabi
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
GetProcessWindowStation
GetUserObjectInformationW
GetLastActivePopup
GetActiveWindow
MessageBoxW
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
`h`hhh
xppwpp
1#QNAN
1#SNAN
generic
iostream
system
iostream stream error
NKagj(h
Visual C++ CRT: Not enough memory to complete call to strerror.
Illegal byte sequence
Directory not empty
Function not implemented
No locks available
Filename too long
Resource deadlock avoided
Result too large
Domain error
Broken pipe
Too many links
Read-only file system
Invalid seek
No space left on device
File too large
Inappropriate I/O control operation
Too many open files
Too many open files in system
Invalid argument
Is a directory
Not a directory
No such device
Improper link
File exists
Resource device
Unknown error
Bad address
Permission denied
Not enough space
Resource temporarily unavailable
No child processes
Bad file descriptor
Exec format error
Arg list too long
No such device or address
Input/output error
Interrupted function call
No such process
No such file or directory
Operation not permitted
No error
>f:yhV:
>f:yhV:
SHGetSpecialFolderPathW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
CTXOPConntion_Class
Software\Tencent\Plugin\VAS
GetNativeSystemInfo
RtlGetNtVersionNumbers
RtlGetVersion
C:\Program Files\VMware\VMware Tools\
\\.\PhysicalDrive0
invalid string position
string too long
0123456789abcdeft^
RegCreateKeyExW
RegSetValueExW
RegDeleteKeyW
RegDeleteValueW
RegEnumValueW
RegEnumKeyExW
g>N1Y%
Window Defender Update
InternetOpenW
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
vector<T> too long
\winos
\cangku\WinOsClientProject\Release\
InitializeCriticalSection
VirtualFree
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
InterlockedDecrement
lstrlenW
MultiByteToWideChar
GetCurrentProcessId
GetLocalTime
GetLocaleInfoW
GetSystemDirectoryW
lstrcatW
GetTickCount
lstrcmpW
GetModuleHandleW
GetConsoleWindow
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CloseHandle
LoadLibraryW
GetProcAddress
CreateFileW
GetCurrentProcess
lstrcpyW
GetLastError
HeapAlloc
GetProcessHeap
HeapFree
OpenProcess
GetDriveTypeW
GetDiskFreeSpaceExW
GlobalMemoryStatusEx
GetSystemInfo
FreeLibrary
GetModuleFileNameW
GetCommandLineW
GetStartupInfoW
CreateProcessW
ExitProcess
WideCharToMultiByte
CreateFileA
DeviceIoControl
QueryPerformanceFrequency
CreateEventW
SetEvent
ResetEvent
QueryPerformanceCounter
WaitForSingleObject
InterlockedExchange
WriteFile
ExpandEnvironmentStringsW
CopyFileW
SetFileAttributesW
GetFileAttributesW
CreateEventA
FormatMessageW
SetLastError
VirtualProtect
IsBadReadPtr
LoadLibraryA
GetNativeSystemInfo
CreateThread
SetErrorMode
SetUnhandledExceptionFilter
CreateMutexW
GetFileSize
DeleteFileW
ReleaseMutex
SetFilePointer
KERNEL32.dll
wsprintfW
GetForegroundWindow
GetWindowTextW
GetMonitorInfoW
EnumDisplayMonitors
GetLastInputInfo
SendMessageW
FindWindowA
GetWindowTextA
GetWindow
GetClassNameA
OpenWindowStationW
SetProcessWindowStation
IsWindow
USER32.dll
GetCurrentHwProfileW
RegOpenKeyExA
RegQueryInfoKeyW
RegEnumKeyExA
RegCloseKey
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
OpenProcessToken
GetTokenInformation
LookupAccountSidW
RegOpenKeyExW
RegQueryValueExW
RegDeleteValueW
RegCreateKeyW
RegSetValueExW
ADVAPI32.dll
SHGetFolderPathW
SHELL32.dll
CoInitialize
CoCreateInstance
CoUninitialize
CoInitializeEx
CoInitializeSecurity
ole32.dll
OLEAUT32.dll
WS2_32.dll
WSAIoctl
WSAStringToAddressW
WSAAddressToStringW
freeaddrinfo
getaddrinfo
WSAResetEvent
WSAEventSelect
WSACloseEvent
WSACreateEvent
WSAEnumNetworkEvents
WSAWaitForMultipleEvents
PathIsDirectoryA
StrChrW
StrPBrkW
SHLWAPI.dll
NetWkstaGetInfo
NETAPI32.dll
DirectInput8Create
DINPUT8.dll
timeGetTime
timeBeginPeriod
timeGetDevCaps
timeEndPeriod
WINMM.dll
InterlockedCompareExchange
RaiseException
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
HeapCreate
HeapDestroy
CreateWaitableTimerW
InterlockedIncrement
MapViewOfFileEx
CreateFileMappingW
SwitchToThread
UnmapViewOfFile
lstrlenA
SetWaitableTimer
CancelWaitableTimer
TryEnterCriticalSection
DecodePointer
EncodePointer
ExitThread
HeapReAlloc
GetCommandLineA
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
GetConsoleCP
GetConsoleMode
HeapSize
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetHandleCount
GetFileType
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
WriteConsoleW
SetStdHandle
FlushFileBuffers
LCMapStringW
ReadFile
LocalFree
DispatchMessageW
TranslateMessage
PeekMessageW
MsgWaitForMultipleObjects
GetInstallDetailsPayload
SignalChromeElf
Version
ngyixiugaidaochuhanshu
.?AVIClient@@
.?AVIArqClient@@
.?AVIPackClient@@
.?AVCAtlException@ATL@@
.?AVIUdpClient@@
.?AV?$CArqSessionT@VCUdpArqClient@@V1@@@
.?AVITcpClient@@
.?AVCTcpClient@@
.?AVCUdpClient@@
.?AVCUdpArqClient@@
.?AV?$CTcpPackClientT@VCTcpClient@@@@
.?AVtype_info@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVbad_exception@std@@
.?AV_com_error@@
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVout_of_range@std@@
.?AVerror_category@std@@
.?AV_Generic_error_category@std@@
.?AV_Iostream_error_category@std@@
.?AV_System_error_category@std@@
Copyright (c) 1992-2004 by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
.?AVCBuffer@@
.?AVexception@std@@
xiugaishiyong
mainsetting
.?AVbad_alloc@std@@
.?AV?$CHPObjectPtr@V?$DualInterface@VIPackClient@@VITcpClient@@@@VITcpClientListener@@UTcpPackClient_Creator@@@@
.?AVCTcpSocket@@
.?AVCTcpClientListener@@
.?AV?$ISocketListenerT@VITcpClient@@@@
.?AV?$IClientListenerT@VITcpClient@@@@
.?AVITcpClientListener@@
.?AVISocketBase@@
.?AVCManager@@
.?AVCKernelManager@@
.?AV?$CHPObjectPtr@V?$DualInterface@VIArqClient@@VIUdpClient@@@@VIUdpClientListener@@UUdpArqClient_Creator@@@@
.?AVCUdpSocket@@
.?AVCUdpClientListener@@
.?AV?$ISocketListenerT@VIUdpClient@@@@
.?AV?$IClientListenerT@VIUdpClient@@@@
.?AVIUdpClientListener@@
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
0:1n1t1
363D3~3
324H4~4
5 5:5m5
7)7.7R7i7r7y7
83888t8{8
8"9B9O9k9r9
9;:L:h:
1,161{1
3&3+3=3B3H3R3j3
494B4J4T4
9$:2:\:
;#;;;B;
<6<H<Z<i<
0"0/0E0
10191J1[1b1
2"3?3T3m3
3&444B4L4p4z4
5%505a5
7,767G7W7`7f7l7t7}7
<*<0<6<A<`<
='===S=o=
>2>F>S>h>r>
>3?T?a?
<0B0O0"191
707M7n7t7
7+808=8D8w8
:,:F:Z:_:f:~:
;/;^;i;s;y;
<$<4<9<E<J<R<X<^<g<z<
0+0?0R0`0d0h0l0p0t0x0|0
1*121~1
2N2Z2v2
3)3S3n3
7L7v7{7
9D:H:L:P:T:X:\:f:x:
1:2G2M2S2Z2b2p2z2B3I3V3]3c3v3
4&5+5=5D5]5
6*7G7e7k7r7
8$9.9=9D9N9T9b9j9r9y9
1E1a1y1
3"3)30373m3
:<:B:O:";9;*<l<
0)0;0L0b0k0y0
11.141E1J1R1X1j1
2%222?2L2
3(323;3E3K3Q3W3d3n3{3
40464C4a4x4
66%666=6Y6k6|6
7:7A7I7O7
9'929?9E9U9h9r9|9
:#:/:@:Q:\:q:
;%;/;4;@;[;f;k;w;
<&<,<B<O<Z<a<g<n<
=D=O=V=l=
>%>,>3>9>@>E>P>U>[>o>
?1?8?>?E?R?n?
0@2O2^2
; ;$;(;,;0;4;8;<;@;D;H;L;P;T;X;\;`;d;h;l;p;t;x;|;
:0;B;|=
S0e0w0
898@8L8X8l8~8
959B9N9Z9n9
3"3b3s3
4E6O6[6
8.8V8e8|8
>6?F?k?q?
4/4O4]4i4
5r6V9h9
V0e0|0
3)324W4w4
7@7K7s7x7
88&8-848;8B8I8P8W8^8e8l8s8z8
8<9B9K9R9
:;;a;t;
<4=O=i>
C0R0s0
1(2$3R3
474[4j5n6
7@8[8w8
;S<g<%=8=@=E=J=O=T=Y=^=d=t=
?2?A?z?
(0D0}0
0"111K1u1S2{2
8L9\9s9
=+>[>f>
0G0j0y1
1L2V2a2
3G3k3.4q4
4=5H5x5
717H7X7o7z7
<I=]=g=
='>9>m>w>
0,0?0G0f0
<P=`=q=x=
3/3C3J3
505I5P5
;);A;R;
;7<L<U<^<
=9=_=}=
? ?$?(?,?0?4?8?<?
1"161q1
364>4Q4\4a4s4}4
5<8B8T8
8G9M9y9
:8:=:B:Y:
:8;?;E;
;A>G>S>
%5-5B5M5
6'6[6s6{6
7D7`7x7
9?9]9d9h9l9p9t9x9|9
9B:M:h:o:t:x:|:
;f;l;p;t;x;
2$2(2.22282<2A2G2K2Q2U2[2_2e2i2
66%6,636:6A6H6O6V6^6f6n6z6
878C8O8[8
9(949@9I9R9
.080E0
2b3i3s3
5W5b5h5
83898D8P8V8^8d8p8v8
8:9@9j9p9v9
9D:g:q:
;;%;5;;;A;P;^;h;n;
<1<7<?<D<L<Q<Y<^<e<t<y<
=3=9=?=
1 1*1E1M1S1a1
2@3L3U3[3a3w3
6y7S8#9T9j9
<4<?<b<
=!=.=:=J=Q=`=l=y=
>5>D>M>q>
Q0Z0f0
1=1F1R1
5 717k7x7
8"8F8}8
;*;F;O;U;^;c;r;
>&?L?R?|?
$0.0Y0q0
0#1F1L1a1
2C2N2X2i2t244E4M4S4X4^4
7!7V7i778X9Q:
5-5{8k9
:%;F;&=G?K?O?S?W?[?_?c?i?
8+8=8c8p8~8
</<I<j<
1&124v5
787Z7*9
<*</<@<H<N<X<^<h<n<x<
>1>R>e>}>
?1?M?z?
!0A0w0
0!1.131A1r1
3Z4E8W8i8{8
9919C9U9g9y9
;%<?<H<
;!<'<,<2<C<Q<
6v73:J:
:H:n:y:
;$;4;@;F;P;`;~;
>$>+>1>8>D>R>b>v>
?:?Q?Y?p?
313A3F3Q3V3a3f3z3
4E4`4e4j4
555P5U5Z5
66+676C6O6Y6e6r6w6}6
7"7+727;7B7K7R7[7b7k7r7{7
l3p3t3x3|3
: <$<(<,<0<4<8<<<@<D<H<L<P<T<X<\<`<d<h<l<p<t<x<|<
=(=,=0=4=8=<=@=D=H=L=P=T=X=\=`=d=h=l=p=t=x=|=
> >$>(>,>0>4>8><>@>D>H>L>P>T>X>\>`>d>h>l>p>t>x>|>
? ?$?(?,?0?4?8?<?@?D?H?L?P?T?X?\?`?d?h?l?p?t?x?|?
0 0$0(0004080<0@0D0H0L0P0T0X0\0`0d0h0l0p0t0x0|0
1 1$1(7,7074787
D1L1T1\1d1l1t1|1
1$7(7,707
> >$>(>,>0>4>8><>@>D>H>L>P>T>X>\>`>d>h>l>p>t>x>|>
? ?$?(?,?0?4?8?<?@?D?H?L?P?T?X?\?`?d?h?
9 9$9(9,9
0 0$0(0,0004080<0@0D0H0L0P0T0X0\0`0
3 3$3(3,3034383<3@3D3H3L3P3T3X3\3`3d3h3
4(5,5<5@5H5`5p5t5
6(686<6L6P6X6p6
7 7$7(707H7X7\7l7p7t7x7|7
8$8(8@8P8T8d8h8l8p8t8x8
9,90949<9T9d9h9x9|9
: :(:@:P:T:d:h:p:
; ;0;4;D;H;L;P;X;p;
< <8<H<L<\<`<h<
= =$=<=@=X=\=t=
>$><>L>P>X>p>
? ?8?H?L?\?`?p?t?|?
04080P0T0l0p0
1(1,10181P1`1d1l1
1d2l2t2
3(3H3P3X3`3h3p3x3
4(40484@4H4P4X4`4h4t4
5,5L5T5\5d5l5t5|5
6$6D6P6p6x6
7(747T7\7h7
8(8H8T8t8
989T9X9x9
:$:@:L:d:h:
;0;P;X;\;t;x;
<4<8<@<H<P<T<\<p<
=0=P=l=p=x=
>$>8>@>L>l>
?,?4?<?H?l?t?|?
0$0l0|0
101<1D1\1d1l1x1
2$2,242X2x2
040P0p0
4X;X<\<`<d<h<l<p<t<x<|<
= =$=(=,=0=4=8=<=@=D=H=L=P=T=X=\=`=d=h=l=p=t=x=|=
>(>8>H>X>|>
?$?,?4?<?D?L?T?\?d?l?t?|?
@0D0P0T0X0\0`0d0h0l0p0t0
545X5|5
7(787H7X7h7x7
8(888H8X8h8x8
9(989H9X9h9x9
:(:8:H:X:h:x:
;(;8;H;X;h;x;
<(<8<H<X<h<x<
=(=8=H=X=h=x=
>(>8>H>X>h>x>
?(?8?H?X?h?x?
0(080H0X0h0x0
1(181H1X1h1x1
2(282H2X2h2x2
3(383H3X3h3x3
4(484H4X4h4x4
5(585H5X5h5x5
6(686H6X6h6x6
7 7$7(7,7074787<7@7D7H7L7P7T7\7t7
< <$<(<,<0<4<8<<<@<D<H<L<P<T<X<\<`<d<h<l<p<t<x<|<
jjjjjj
jjjjjj
jjjjjj
#+3;CScs
%d.%d.%d.%d%c
UNKNOWN ERROR
SSL environment not ready
Send Data Fail
Process Data Error
Network Error
Connect to Server Fail
Attach SOCKET to IOCP Fail
Create Detector Thread Fail
Create Worker Thread Fail
Create IOCP Fail
Listen SOCKET Fail
Prepare SOCKET Fail
Bind SOCKET Fail
Create SOCKET Fail
Invalid Parameter
Illegal State
SUCCESS
mscoree.dll
wKERNEL32.DLL
runtime error
TLOSS error
SING error
DOMAIN error
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
- abort() has been called
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
(null)
WUSER32.DLL
((((( H
h(((( H
H
CONOUT$
UnThreat
UnThreat.exe
K7TSecurity.exe
Ad-watch
ad-watch.exe
PSafeSysTray.exe
BitDefender
vsserv.exe
remupd.exe
rtvscan.exe
ashDisp.exe
avcenter.exe
TMBMSRV.exe
knsdtray.exe
egui.exe
Mcshield.exe
avp.exe
F-Secure
f-secure.exe
avgwdsvc.exe
AYAgent.aye
V3Svc.exe
Outpost
acs.exe
DR.WEB
SPIDer.exe
Comodo
cfp.exe
mssecess.exe
QuickHeal
QUHLPSVC.EXE
RavMonD.exe
KvMonXP.exe
baiduSafeTray.exe
BaiduSd.exe
HipsTray.exe
QQPCRTP.exe
KSafeTray.exe
kxetray.exe
360sd.exe
ZhuDongFangYu.exe
360tray.exe
360Tray.exe
360Safe.exe
ProcessorNameString
HARDWARE\DESCRIPTION\System\CentralProcessor\0
BEIZHU
%4d.%2d.%2d-%2d:%2d:%2d
%s %d %d %d %d
%s %d %d %d %d
%4d.%2d.%2d-%2d:%2d:%2d
GFIRestart32.exe
Shell32.dll
W%s\%s
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ADVAPI32.dll
FriendlyName
NONE_MAPPED
%d Gb
%d Gb
%d Gb
%d Gb
DriverDesc
SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
okernel32.dll
ntdll.dll
%d.%d.%d
XP-sp1
XP-sp2
XP-sp3
Vista-sp1
Vista-sp2
Win7-sp1
2008R2
Win8R1
2012R2
%s %d.%d.%d.%d.%d
VMwareService.exe
VMwareTray.exe
VMwareUser.exe
localhost
WORKGROUP
%s--%s
%s\shell\open\command
WinSta0\Default
C:\ProgramData\Microsoft\Server.exe
Server.exe
wininet.dll
MSIE 6.0
winsta0
www.baidu.com
127.0.0.1
\sys.key
:]%d-%d-%d %d:%d:%d
@[esc]
[enter]
[lctrl]
[lshift]
[rshift]
[lalt]
[numlock]
[scrolllock]
[enter]
[rctrl]
[ralt]
[home]
[pagup]
[pagdn]
[lwin]
[rwin]
1.0.0.721
654321
1.0.0.721
654321
1.0.0.721
654321
2025. 1
2000.ink
woaini123
Antivirus Signature
Bkav Clean
Lionic Clean
Elastic Windows.Trojan.DustyWarehouse
ClamAV Win.Malware.Fragtor-10002223-0
CMC Clean
CAT-QuickHeal Clean
Skyhigh BehavesLike.Win32.FileRep.gc
ALYac Gen:Variant.Jaik.204635
Cylance Unsafe
Zillya Trojan.Keylogger.Win32.78936
Sangfor Trojan.Win32.SilverFox.swkah
CrowdStrike win/malicious_confidence_90% (D)
Alibaba Clean
K7GW Spyware ( 00591f551 )
K7AntiVirus Spyware ( 00591f551 )
huorong TrojanSpy/Keylogger.cg
Baidu Clean
VirIT Clean
Paloalto Clean
Symantec Clean
tehtris Clean
ESET-NOD32 a variant of Win32/Farfli.DDH
APEX Malicious
Avast Win32:MalwareX-gen [Misc]
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan-Spy.Win64.AntiAV.gen
BitDefender Gen:Variant.Jaik.204635
NANO-Antivirus Trojan.Win32.Farfli.khthkw
ViRobot Clean
MicroWorld-eScan Gen:Variant.Jaik.204635
Tencent Backdoor.Win64.Downloader_l.16001292
Sophos Clean
F-Secure Heuristic.HEUR/AGEN.1370663
DrWeb Clean
VIPRE Gen:Variant.Jaik.204635
TrendMicro Clean
McAfeeD Clean
Trapmine suspicious.low.ml.score
CTX dll.unknown.jaik
Emsisoft Gen:Variant.Jaik.204635 (B)
Ikarus Trojan-Spy.Win32.KeyLogger
GData Win32.Trojan-Spy.Agent.BPW
Jiangmin Clean
Webroot Clean
Varist Clean
Avira HEUR/AGEN.1370663
Antiy-AVL Trojan[Spy]/Win32.Agent
Kingsoft Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Jaik.D31F5B
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Program:Win32/Wacapew.C!ml
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5560616
Acronis Clean
McAfee Clean
TACHYON Clean
VBA32 Clean
Malwarebytes Crypt.Trojan.Malicious.DDS
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall Clean
Rising Backdoor.Farfli!1.DE41 (CLASSIC)
Yandex Clean
SentinelOne Static AI - Suspicious PE
MaxSecure Trojan.Malware.186401462.susgen
Fortinet W32/Agent.SS!tr
AVG Win32:MalwareX-gen [Misc]
DeepInstinct Clean
alibabacloud Backdoor:Win/Manuscrypt.RI!MTB
No IRMA results available.