Static | ZeroBOX

PE Compile Time

2084-08-22 17:49:52

PDB Path

rundll32.pdb

PE Imphash

bb17b2fbbff4bbf5ebdca7d0bb9e4a5b

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00007000 0x00006200 6.28007033399
.data 0x00008000 0x00001000 0x00000600 0.469518751512
.idata 0x00009000 0x00002000 0x00001800 5.08959789975
.didat 0x0000b000 0x00001000 0x00000200 1.34118083046
.rsrc 0x0000c000 0x00007000 0x00006800 5.70298132893
.reloc 0x00013000 0x00001000 0x00000800 6.31167410785

Resources

Name Offset Size Language Sub-language File type
MUI 0x00012698 0x000000d0 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x000121b8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000121b8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000121b8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000121b8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000121b8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000121b8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000121b8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000121b8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x00012620 0x00000076 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x0000c590 0x000003a8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x0000c938 0x00000164 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text
RT_MANIFEST 0x0000c938 0x00000164 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library msvcrt.dll:
0x1c91f4 _XcptFilter
0x1c91f8 _onexit
0x1c91fc __CxxFrameHandler3
0x1c9200 __dllonexit
0x1c9204 _wcmdln
0x1c9208 __set_app_type
0x1c920c _lock
0x1c9210 _cexit
0x1c9214 ?terminate@@YAXXZ
0x1c9218 _vsnwprintf
0x1c921c _initterm
0x1c9220 __p__fmode
0x1c9224 __setusermatherr
0x1c9228 __wgetmainargs
0x1c922c __p__commode
0x1c9230 _amsg_exit
0x1c9238 exit
0x1c923c _unlock
0x1c9240 free
0x1c9244 _purecall
0x1c9248 _controlfp
0x1c924c _wtoi
0x1c9250 memcpy_s
0x1c9254 _exit
0x1c9258 _callnewh
0x1c925c malloc
0x1c9260 memset
Library api-ms-win-core-com-l1-1-0.dll:
0x1c9010 CLSIDFromString
0x1c9014 CoUninitialize
0x1c9018 CoCreateInstance
0x1c9028 CoRevokeClassObject
0x1c9030 CoInitializeEx
Library api-ms-win-core-file-l1-1-0.dll:
0x1c9084 CreateFileW
0x1c9088 GetFileAttributesW
0x1c908c ReadFile
0x1c9090 SetFilePointer
Library api-ms-win-core-libraryloader-l1-2-0.dll:
0x1c90c8 GetModuleHandleExW
0x1c90cc GetModuleFileNameA
0x1c90d0 GetProcAddress
0x1c90d4 LoadStringW
0x1c90d8 FreeLibrary
0x1c90dc GetModuleHandleW
0x1c90e0 LoadLibraryExW
Library api-ms-win-core-wow64-l1-1-1.dll:
0x1c91d4 IsWow64Process2
Library api-ms-win-core-synch-l1-1-0.dll:
0x1c9160 WaitForSingleObject
0x1c9164 OpenSemaphoreW
0x1c9174 SetEvent
0x1c917c CreateSemaphoreExW
0x1c9180 ReleaseSemaphore
0x1c9184 CreateMutexExW
0x1c9188 CreateEventW
0x1c9190 ReleaseMutex
Library api-ms-win-core-heap-l1-1-0.dll:
0x1c90a0 HeapFree
0x1c90a4 HeapSetInformation
0x1c90a8 HeapAlloc
0x1c90ac GetProcessHeap
Library api-ms-win-core-errorhandling-l1-1-0.dll:
0x1c9070 SetErrorMode
0x1c9074 SetLastError
0x1c907c GetLastError
Library api-ms-win-core-processenvironment-l1-1-0.dll:
0x1c90f8 SearchPathW
0x1c90fc GetCommandLineW
Library api-ms-win-core-processthreads-l1-1-0.dll:
0x1c9104 GetCurrentProcessId
0x1c9108 ExitProcess
0x1c910c CreateProcessW
0x1c9110 GetCurrentProcess
0x1c9114 GetStartupInfoW
0x1c9118 GetCurrentThreadId
0x1c911c TerminateProcess
Library api-ms-win-core-util-l1-1-0.dll:
0x1c91b8 EncodePointer
0x1c91bc DecodePointer
Library api-ms-win-core-heap-l2-1-0.dll:
0x1c90b4 LocalFree
0x1c90b8 LocalAlloc
Library api-ms-win-core-sysinfo-l1-1-0.dll:
0x1c91ac GetSystemDirectoryW
0x1c91b0 GetTickCount
Library api-ms-win-core-winrt-error-l1-1-0.dll:
0x1c91c4 RoOriginateError
0x1c91c8 RoOriginateErrorW
Library api-ms-win-core-processthreads-l1-1-1.dll:
Library api-ms-win-core-localization-l1-2-0.dll:
0x1c90e8 FormatMessageW
Library api-ms-win-core-console-l1-2-0.dll:
0x1c9040 AttachConsole
0x1c9044 FreeConsole
Library api-ms-win-core-debug-l1-1-0.dll:
0x1c904c OutputDebugStringW
0x1c9050 DebugBreak
0x1c9054 IsDebuggerPresent
Library api-ms-win-core-handle-l1-1-0.dll:
0x1c9098 CloseHandle
Library api-ms-win-core-path-l1-1-0.dll:
0x1c90f0 PathCchAppend
Library api-ms-win-core-console-l1-1-0.dll:
0x1c9038 WriteConsoleW
Library api-ms-win-core-string-l1-1-0.dll:
0x1c914c CompareStringW
0x1c9150 WideCharToMultiByte
Library api-ms-win-core-synch-l1-2-0.dll:
0x1c9198 Sleep
Library api-ms-win-core-profile-l1-1-0.dll:
Library api-ms-win-core-string-l2-1-0.dll:
0x1c9158 CharNextW
Library api-ms-win-core-kernel32-private-l1-1-0.dll:
Library api-ms-win-core-sidebyside-l1-1-0.dll:
0x1c9134 ReleaseActCtx
0x1c9138 DeactivateActCtx
0x1c913c CreateActCtxW
0x1c9140 QueryActCtxW
0x1c9144 ActivateActCtx
Library api-ms-win-downlevel-shlwapi-l1-1-1.dll:
0x1c91dc PathIsRelativeW
Library api-ms-win-downlevel-shlwapi-l2-1-1.dll:
0x1c91e4 SHSetThreadRef
Library imagehlp.dll:
Library ntdll.dll:
0x1c926c NtOpenProcessToken
0x1c9284 RtlImageNtHeader
0x1c928c NtClose
Library api-ms-win-core-delayload-l1-1-1.dll:
Library api-ms-win-core-delayload-l1-1-0.dll:
Library api-ms-win-core-apiquery-l1-1-0.dll:

!This program cannot be run in DOS mode.
`.data
.idata
.didat
@.reloc
api-ms-win-core-winrt-string-l1-1-0.dll
api-ms-win-core-winrt-l1-1-0.dll
ext-ms-win-ntuser-dialogbox-l1-1-0.dll
ext-ms-win-ntuser-gui-l1-1-0.dll
ext-ms-win-ntuser-message-l1-1-0.dll
ext-ms-win-ntuser-windowclass-l1-1-1.dll
ext-ms-win-ntuser-windowclass-l1-1-0.dll
ext-ms-win-ntuser-windowclass-l1-1-2.dll
ext-ms-win-ntuser-window-l1-1-0.dll
ext-ms-win-rtcore-ntuser-cursor-l1-1-0.dll
Exception
ReturnHr
FailFast
RaiseFailFastException
RtlDllShutdownInProgress
internal\sdk\inc\wil\resource.h
WilError_02
WldpIsAllowedEntryPoint
rundll32.pdb
.rdata$brc
.rdata$T$brc
.CRT$XCA
.CRT$XCAA
.CRT$XCU
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIY
.CRT$XIZ
.CRT$XLA
.CRT$XLZ
.gfids
.giats
.rdata
.rdata$sxdata
.rdata$zzzdbg
.text$di
.text$mn
.text$x
.text$yd
.tls$ZZZ
.xdata$x
minATL$__a
minATL$__f
minATL$__m
minATL$__z
.didat$2
.didat$3
.didat$4
.didat$6
.didat$7
.data$brc
.idata$5
.00cfg
.idata$2
.idata$3
.idata$4
.idata$6
.didat$5
.rsrc$01
.rsrc$02
SVWQQ3
9~(s2Wj
SSSSSSh
PWWWWWW
\$(Pj"j
SVWj@3
j,Zj"Yf;
\tj/Xf;
SVSSSS
QRPh\l
QRPh|l
QRPh<m
QRPh\m
QRPh|m
WindowsCreateString
WindowsStringHasEmbeddedNull
WindowsIsStringEmpty
RoRegisterActivationFactories
WindowsDeleteString
WindowsGetStringRawBuffer
RoRevokeActivationFactories
MessageBoxW
LoadIconW
PostThreadMessageW
TranslateMessage
DispatchMessageW
GetMessageW
GetClassLongW
SetWindowLongW
GetClassNameW
RegisterClassW
SetClassLongW
GetWindowLongW
DestroyWindow
CreateWindowExW
GetWindow
DefWindowProcW
LoadCursorW
0w`i*w@O-w
)w@*3w
9rv Orv
8rvP"rv`
NvPsNv
uNv0oKv
Qv`pKv
Pv rNv`_Lv0
_vsnwprintf
memcpy_s
_purecall
_XcptFilter
__p__commode
_amsg_exit
__wgetmainargs
__set_app_type
_cexit
__p__fmode
__setusermatherr
_initterm
_wcmdln
msvcrt.dll
__CxxFrameHandler3
_unlock
__dllonexit
_onexit
?terminate@@YAXXZ
_controlfp
_except_handler4_common
CoAddRefServerProcess
ReadFile
GetModuleFileNameA
IsWow64Process2
CoReleaseServerProcess
CreateSemaphoreExW
HeapFree
SetLastError
GetCommandLineW
GetCurrentProcess
ReleaseSemaphore
GetModuleHandleExW
CoWaitForMultipleHandles
GetSystemWow64Directory2W
CoUninitialize
CoCreateInstance
EncodePointer
SetErrorMode
SetFilePointer
CoRegisterClassObject
WaitForSingleObject
LocalAlloc
CreateFileW
GetCurrentThreadId
ReleaseMutex
GetSystemDirectoryW
RoOriginateErrorW
CoResumeClassObjects
SetProcessMitigationPolicy
CreateEventW
FormatMessageW
CoInitializeSecurity
GetLastError
AttachConsole
ReleaseSRWLockExclusive
OutputDebugStringW
SetEvent
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
ReleaseSRWLockShared
FreeConsole
HeapSetInformation
RoOriginateError
HeapAlloc
PathCchAppend
LoadStringW
DecodePointer
WriteConsoleW
GetProcAddress
CreateMutexExW
LocalFree
AcquireSRWLockShared
CLSIDFromString
ExitProcess
GetCurrentProcessId
GetProcessHeap
CreateProcessW
GetModuleHandleW
FreeLibrary
WideCharToMultiByte
CoInitializeEx
DebugBreak
CoRevokeClassObject
LoadLibraryExW
IsDebuggerPresent
GetStartupInfoW
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount
SearchPathW
CompareStringW
GetFileAttributesW
CharNextW
api-ms-win-core-com-l1-1-0.dll
api-ms-win-core-file-l1-1-0.dll
api-ms-win-core-libraryloader-l1-2-0.dll
api-ms-win-core-wow64-l1-1-1.dll
api-ms-win-core-synch-l1-1-0.dll
api-ms-win-core-heap-l1-1-0.dll
api-ms-win-core-errorhandling-l1-1-0.dll
api-ms-win-core-processenvironment-l1-1-0.dll
api-ms-win-core-processthreads-l1-1-0.dll
api-ms-win-core-util-l1-1-0.dll
api-ms-win-core-heap-l2-1-0.dll
api-ms-win-core-sysinfo-l1-1-0.dll
api-ms-win-core-winrt-error-l1-1-0.dll
api-ms-win-core-processthreads-l1-1-1.dll
api-ms-win-core-localization-l1-2-0.dll
api-ms-win-core-console-l1-2-0.dll
api-ms-win-core-debug-l1-1-0.dll
api-ms-win-core-handle-l1-1-0.dll
api-ms-win-core-path-l1-1-0.dll
api-ms-win-core-console-l1-1-0.dll
api-ms-win-core-string-l1-1-0.dll
api-ms-win-core-synch-l1-2-0.dll
api-ms-win-core-profile-l1-1-0.dll
api-ms-win-core-string-l2-1-0.dll
Wow64EnableWow64FsRedirection
CreateActCtxW
ActivateActCtx
DeactivateActCtx
ReleaseActCtx
QueryActCtxW
api-ms-win-core-kernel32-private-l1-1-0.dll
api-ms-win-core-sidebyside-l1-1-0.dll
PathIsRelativeW
api-ms-win-downlevel-shlwapi-l1-1-1.dll
SHSetThreadRef
api-ms-win-downlevel-shlwapi-l2-1-1.dll
ImageDirectoryEntryToData
imagehlp.dll
NtQuerySystemInformation
RtlImageNtHeader
RtlWow64IsWowGuestMachineSupported
NtSetInformationProcess
RtlSetSearchPathMode
NtQueryInformationToken
RtlNtStatusToDosError
NtOpenProcessToken
NtClose
NtSetInformationToken
ntdll.dll
malloc
_callnewh
ResolveDelayLoadedAPI
DelayLoadFailureHook
api-ms-win-core-delayload-l1-1-1.dll
api-ms-win-core-delayload-l1-1-0.dll
ApiSetQueryApiSetPresence
api-ms-win-core-apiquery-l1-1-0.dll
memset
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!-- Copyright (c) Microsoft Corporation -->
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" xmlns:asmv3="urn:schemas-microsoft-com:asm.v3" manifestVersion="1.0">
<assemblyIdentity
name="Microsoft.Windows.Shell.rundll32"
processorArchitecture="x86"
version="5.1.0.0"
type="win32"/>
<description>Rundll32</description>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
<?xml version='1.0' encoding='utf-8' standalone='yes'?>
<assembly
xmlns="urn:schemas-microsoft-com:asm.v1"
manifestVersion="1.0"
<assemblyIdentity
name="Microsoft.Windows.Shell.rundll32"
processorArchitecture="*"
type="win32"
version="5.1.0.0"
/>
<description>Rundll32</description>
</assembly>
wwwwwwwwwq
nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXnnnnnnnnnnnnkkaaaaagddddddddddddddddddddddddiiiXnnnnnnnnnnnnlTUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU!iXnnnnnnnnnnnnl
////////
44((((((( 2222UdXnnnnnnnnnnnnl
:////////
44((((((((( 22UdXnnnnnnnnnnnnj
/////////
44((((((( 22UdXnnnnnnnnnnnnj
:///////
44(((((((( UdXnnnnnnnnnnnnj
:////////
44(((((((( UgXnnnnnnnnnnnnj
////////
444((((((( VaXnnnnnnnnnnnnQ
/////////
44(((((((VaXnnnnnnnnnnnnQ
////////
4((((((VaXnnnnnnnnnnnnh
////////
4(((((VaXnnnnnnnnnnnnh
:////////
44(((WaXnnnnnnnnnnnnP
......
////////
44((WfXnnnnnnnnnnnnP
......
:////////
44WfXnnnnnnnnnnnnF
......
:////////
4W_XnnnnnnnnnnnnF
......
:////////
[_XnnnnnnnnnnnnO
......
/////////
[_XnnnnnnnnnnnnO
......
:////////
[bXnnnnnnnnnnnnE
........
////////
[]XnnnnnnnnnnnnE
......
////////[]XnnnnnnnnnnnnC
.......
://////[]XnnnnnnnnnnnnC
.......
://///[]Xnnnnnnnnnnnn<
......
:////^]Xnnnnnnnnnnnn<
///^]Xnnnnnnnnnnnn;
......
:/^\Xnnnnnnnnnnnn;
.......
^\Xnnnnnnnnnnnn8
......
`\Xnnnnnnnnnnnn8
......
`JXnnnnnnnnnnnn?
......
`JXnnnnnnnnnnnn?
......
`JXnnnnnnnnnnnn7
......
`ZXnnnnnnnnnnnn7RS
.....eZXnnnnnnnnnnnn3
....eDXnnnnnnnnnnnn3
...eDXnnnnnnnnnnnn,
.eDXnnnnnnnnnnnn,
W[[^^`eYXnnnnnnnnnnnn,
HHIIIIYcjXnnnnnnnnnnnn+
-Xnnnnnnnnnnnnn+
&Xnnnnnnnnnnnnnn1
%Xnnnnnnnnnnnnnnn1
$Xnnnnnnnnnnnnnnnn"
#Xnnnnnnnnnnnnnnnnn"
'Xnnnnnnnnnnnnnnnnnn!
Xnnnnnnnnnnnnnnnnnnn!(( )))***6600555===>>>GGBInnnnnnnnnnnnnn
Pjnqw~
Gehiqr|
G]ceiqty~
?X\cgiltw}
?MSX]chmqty}
:HNRT\cfiovy}
:BHJQW\cghlouy
0@CDIMWY]agiqry~
+9=ADJLQW\cgilrw{
"46=@CFKRSX_cjknxy
",169>CDJNRX]cekprx}
)*.57;ABHNQR\`eilrx
#&,-489@BIJOWY]chkn
!&*-169=ADLNUT[chj
#',/26;ABHLQW\_e
!&)/46;@BCKQWZ]
%)-169>@CHMRX
#'*-47;>E
#&(-36;
!#(*14
"+0:?GP^d
D?;72-)#!
JF@<83.(%"
RLIB>:5/*&
WSNIC?;61-
_[TPJF@<74
d`\VPLGA=9$
lfb]XSMHB>'
rmic^YUOJD,
xsojeaZVPK0
zvpkga[WQ+
|wqmhEE
iK2%)U+
I/"bH4''99
Q7+<Y@3
T8,@X;1
Q:+BUB/
Q8,RZB1`@@
N. HY7!
O3$dS7"%U9
0$0(0,0004080<0@0D0H0L0P0T0X0\0`0d0h0l0p0t0x0|0
1\1`1h1p1
>">&>,>0>6>:>J>
#0U0^0d0~0
1C1R1_1{1
212M2\2
3&30393C3L3i3|3
7'7/7;7H7X7b7o7y7
<+<5<D<
2!212A2
3J3P3_3h3u3|3
4 565o5w5
6#6(636K6_6i6
7#7*7A7N7U7d7r7
7@8M8i8o8
:!:M:V:h:
;';3;S;j;v;
=(=1=J=
?.?A?I?c?o?
0>0S0p0v0
1Q1{1,262@2H2R2w2~2
373G3S3^3e3v3
5M6c6i6
8I8P8~8
</<Z<_<
='=9=}=
=:>v>{>
>!?>?M?
0#0U0m0
1;1F1X1k1t1|1
1*2F2T2
484K4f4n4
8)8<8X8
9/9P9~9
9>:I:Y:k:
;#;8;Z;o;x;
;#<4<Z<w<~<
=!=?=H=N=V=\=x=
>*>=>_>j>|>
?]?g?m?w?
0%0+080R0]0g0r0
1*10161<1B1H1R1W1]1k1t1
22)232C2S2Y2d2j2v2
3(323B3K3Y3v3
7*7?7N7V7k7t7y7
7L8l8r8x8~8
9+989E9S9`9n9{9
:#:1:;:E:O:\:
;;8;?;a;
<$<(<D<H<P<
0$0,04080<0@0H0L0P0T0\0`0d0h0p0x0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-1
ext-ms-win-ntuser-dialogbox-l1-1-2
ext-ms-win-ntuser-dialogbox-l1-1-3
ntdll.dll
kernelbase.dll
%hs(%d)\%hs!%p:
%hs!%p:
(caller: %p)
%hs(%d) tid(%x) %08X %ws
Msg:[%ws]
CallContext:[%hs]
[%hs(%hs)]
2CONOUT$
rundll32.exe
WLDP.DLL
tlocalserver
RunDLL
requestedRunLevel
Local\SM0:%d:%d:%hs
activatibleClassId
.manifest
VS_VERSION_INFO
StringFileInfo
040904B0
CompanyName
Microsoft Corporation
FileDescription
Windows host process (Rundll32)
FileVersion
10.0.17763.1697 (WinBuild.160101.0800)
InternalName
rundll
LegalCopyright
Microsoft Corporation. All rights reserved.
OriginalFilename
RUNDLL32.EXE
ProductName
Microsoft
Windows
Operating System
ProductVersion
10.0.17763.1697
VarFileInfo
Translation
Antivirus Signature
Bkav Clean
Elastic Clean
MicroWorld-eScan Clean
CMC Clean
CAT-QuickHeal Clean
ALYac Clean
Malwarebytes Clean
VIPRE Clean
AegisLab Clean
Sangfor Clean
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
Cybereason Clean
Baidu Clean
Cyren Clean
Symantec Clean
ESET-NOD32 Clean
APEX Clean
Paloalto Clean
ClamAV Clean
Kaspersky Clean
Alibaba Clean
NANO-Antivirus Clean
SUPERAntiSpyware Clean
Tencent Clean
Ad-Aware Clean
Emsisoft Clean
Comodo Clean
F-Secure Clean
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition Clean
FireEye Generic.mg.3e814f38a7158bfc
Sophos ML/PE-A
Ikarus Clean
Jiangmin Clean
Webroot Clean
Avira Clean
MAX Clean
Antiy-AVL Clean
Kingsoft Clean
Microsoft Clean
Gridinsoft Clean
Arcabit Clean
ViRobot Clean
ZoneAlarm Clean
GData Clean
Cynet Clean
AhnLab-V3 Clean
Acronis Clean
McAfee Clean
TACHYON Clean
VBA32 Clean
Cylance Unsafe
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Clean
Yandex Clean
SentinelOne Static AI - Suspicious PE
eGambit Unsafe.AI_Score_100%
Fortinet Clean
BitDefenderTheta Clean
Qihoo-360 Clean
Avast Clean
CrowdStrike win/malicious_confidence_70% (D)
MaxSecure Clean
No IRMA results available.