Static | ZeroBOX

PE Compile Time

2015-08-04 11:43:56

PE Imphash

f4fd5e474d548b6e56174e1335f360a9

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00005b8d 0x00005c00 6.47462654877
.rdata 0x00007000 0x000014b6 0x00001600 5.15942107772
.data 0x00009000 0x0001acfc 0x00000200 1.82342595167
.ndata 0x00024000 0x0002e000 0x00000000 0.0
.rsrc 0x00052000 0x0002b758 0x0002b800 4.8147839332

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0007cdc0 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0007cdc0 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0007cdc0 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0007cdc0 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0007cdc0 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0007cdc0 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0007cdc0 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x0007d230 0x000000ee LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x0007d230 0x000000ee LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x0007d230 0x000000ee LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x0007d320 0x00000068 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x0007d388 0x000003c9 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document, ASCII text, with very long lines, with no line terminators

Imports

Library KERNEL32.dll:
0x407064 SearchPathA
0x407068 GetShortPathNameA
0x40706c GetFullPathNameA
0x407070 MoveFileA
0x407078 GetFileAttributesA
0x40707c GetLastError
0x407080 CreateDirectoryA
0x407084 SetFileAttributesA
0x407088 Sleep
0x40708c GetTickCount
0x407090 GetFileSize
0x407094 GetModuleFileNameA
0x407098 GetCurrentProcess
0x40709c CopyFileA
0x4070a0 ExitProcess
0x4070a8 CompareFileTime
0x4070ac GetCommandLineA
0x4070b0 GetVersion
0x4070b4 SetErrorMode
0x4070b8 lstrcpynA
0x4070bc GetDiskFreeSpaceA
0x4070c0 GlobalUnlock
0x4070c4 GlobalLock
0x4070c8 CreateThread
0x4070cc CreateProcessA
0x4070d0 CreateFileA
0x4070d4 GetTempFileNameA
0x4070d8 lstrlenA
0x4070dc lstrcatA
0x4070e0 LoadLibraryA
0x4070e4 GetSystemDirectoryA
0x4070e8 RemoveDirectoryA
0x4070ec SetFileTime
0x4070f0 CloseHandle
0x4070f4 lstrcmpiA
0x4070f8 lstrcmpA
0x407100 GlobalAlloc
0x407104 WaitForSingleObject
0x407108 GetExitCodeProcess
0x40710c GlobalFree
0x407110 GetModuleHandleA
0x407114 LoadLibraryExA
0x407118 GetProcAddress
0x40711c FreeLibrary
0x407120 MultiByteToWideChar
0x40712c WriteFile
0x407130 MulDiv
0x407134 ReadFile
0x407138 SetFilePointer
0x40713c FindClose
0x407140 FindNextFileA
0x407144 FindFirstFileA
0x407148 DeleteFileA
0x40714c GetTempPathA
Library USER32.dll:
0x407170 GetMessagePos
0x407174 CallWindowProcA
0x407178 IsWindowVisible
0x40717c LoadBitmapA
0x407180 CloseClipboard
0x407184 SetClipboardData
0x407188 EmptyClipboard
0x40718c OpenClipboard
0x407190 TrackPopupMenu
0x407194 GetWindowRect
0x407198 AppendMenuA
0x40719c CreatePopupMenu
0x4071a0 GetSystemMetrics
0x4071a4 EndDialog
0x4071a8 EnableMenuItem
0x4071ac GetSystemMenu
0x4071b0 SetClassLongA
0x4071b4 IsWindowEnabled
0x4071b8 SetWindowPos
0x4071bc ScreenToClient
0x4071c0 GetClassInfoA
0x4071c4 CreateWindowExA
0x4071cc RegisterClassA
0x4071d0 SetDlgItemTextA
0x4071d4 GetDlgItemTextA
0x4071d8 MessageBoxIndirectA
0x4071dc CharPrevA
0x4071e0 DispatchMessageA
0x4071e4 PeekMessageA
0x4071e8 ExitWindowsEx
0x4071ec DestroyWindow
0x4071f0 CreateDialogParamA
0x4071f4 SetTimer
0x4071f8 SetWindowTextA
0x4071fc PostQuitMessage
0x407200 SetForegroundWindow
0x407204 wsprintfA
0x407208 SendMessageTimeoutA
0x40720c CheckDlgButton
0x407210 LoadCursorA
0x407214 SetCursor
0x407218 GetWindowLongA
0x40721c GetSysColor
0x407220 DialogBoxParamA
0x407224 CharNextA
0x407228 FindWindowExA
0x40722c IsWindow
0x407230 GetDlgItem
0x407234 SetWindowLongA
0x407238 LoadImageA
0x40723c GetDC
0x407240 EnableWindow
0x407244 InvalidateRect
0x407248 SendMessageA
0x40724c DefWindowProcA
0x407250 BeginPaint
0x407254 GetClientRect
0x407258 FillRect
0x40725c DrawTextA
0x407260 EndPaint
0x407264 ShowWindow
Library GDI32.dll:
0x407040 SetBkColor
0x407044 GetDeviceCaps
0x407048 DeleteObject
0x40704c CreateBrushIndirect
0x407050 CreateFontIndirectA
0x407054 SetBkMode
0x407058 SetTextColor
0x40705c SelectObject
Library SHELL32.dll:
0x407154 SHBrowseForFolderA
0x40715c SHGetFileInfoA
0x407160 ShellExecuteA
0x407164 SHFileOperationA
Library ADVAPI32.dll:
0x407000 RegOpenKeyExA
0x407004 RegEnumValueA
0x407008 RegEnumKeyA
0x40700c RegCloseKey
0x407010 SetFileSecurityA
0x407014 RegDeleteValueA
0x407018 RegCreateKeyExA
0x40701c RegSetValueExA
0x407020 RegDeleteKeyA
0x407024 RegQueryValueExA
Library COMCTL32.dll:
0x40702c ImageList_AddMasked
0x407030 ImageList_Destroy
0x407034 None
0x407038 ImageList_Create
Library ole32.dll:
0x40726c OleUninitialize
0x407270 OleInitialize
0x407274 CoTaskMemFree
0x407278 CoCreateInstance

!This program cannot be run in DOS mode.
`.rdata
@.data
.ndata
s695,<B
QSSSPW
v#Vh.,@
Instu`
softuW
NulluN
D$8PSh
8NCRCu
> _?=t
Vj%SSS
PSWh<t@
G;=,<B
v&hxt@
D$ +D$
D$0+D$(P
PPPPPP
<v"Ph
uUh`v@
uZh`v@
Ed+EL;E
u$9Mls
)Mh)Mlf
u$9Mls
)Mh)Mlf
u$9Mls
)Mh)Mlf
Ed+EL;E
]4;Mhr
E89E0}r
u$9Uls
+)Uh)Ul3
Ed+EL;E
)Mh)Mlf
u$9Mls
)Mh)Mlf
verifying installer: %d%%
... %d%%
Installer integrity check has failed. Common causes include
incomplete download and damaged media. Contact the
installer's author to obtain a new copy.
More information at:
http://nsis.sf.net/NSIS_Error
Error launching installer
SeShutdownPrivilege
NSIS Error
SETUPAPI
USERENV
UXTHEME
Error writing temporary file. Make sure your temp folder is valid.
%u.%u%s%s
RichEdit
RichEdit20A
RichEd32
RichEd20
.DEFAULT\Control Panel\International
Control Panel\Desktop\ResourceLocale
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VERSION
SHGetFolderPathA
SHFOLDER
SHAutoComplete
SHLWAPI
SHELL32
InitiateShutdownA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyExA
ADVAPI32
GetUserDefaultUILanguage
MoveFileExA
GetDiskFreeSpaceExA
SetDefaultDllDirectories
KERNEL32
[Rename]
Software\Microsoft\Windows\CurrentVersion
\Microsoft\Internet Explorer\Quick Launch
*?|<>/":
%s%s.dll
MulDiv
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
ReadFile
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
FreeLibrary
GetProcAddress
LoadLibraryExA
GetModuleHandleA
GlobalFree
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
ExpandEnvironmentStringsA
lstrcmpA
lstrcmpiA
CloseHandle
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
GetTempPathA
GetCommandLineA
GetVersion
SetErrorMode
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
LoadLibraryA
GetSystemDirectoryA
RemoveDirectoryA
KERNEL32.dll
EndPaint
DrawTextA
FillRect
GetClientRect
BeginPaint
DefWindowProcA
SendMessageA
InvalidateRect
EnableWindow
LoadImageA
SetWindowLongA
GetDlgItem
IsWindow
FindWindowExA
SendMessageTimeoutA
wsprintfA
ShowWindow
SetForegroundWindow
PostQuitMessage
SetWindowTextA
SetTimer
CreateDialogParamA
DestroyWindow
ExitWindowsEx
CharNextA
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
ScreenToClient
GetMessagePos
CallWindowProcA
IsWindowVisible
LoadBitmapA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuA
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
USER32.dll
SelectObject
SetTextColor
SetBkMode
CreateFontIndirectA
CreateBrushIndirect
DeleteObject
GetDeviceCaps
SetBkColor
GDI32.dll
SHFileOperationA
ShellExecuteA
SHGetFileInfoA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHELL32.dll
RegDeleteKeyA
RegCloseKey
RegEnumKeyA
RegOpenKeyExA
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
SetFileSecurityA
ADVAPI32.dll
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
COMCTL32.dll
CoCreateInstance
OleUninitialize
OleInitialize
CoTaskMemFree
ole32.dll
%A!#<D%/SD#8_F$:aM#;fS$<i]%>lf%=jp%;fy&8a
%;fx$=ip$>le#;hZ$9bQ%6\I$*JF#
$K%@kq%W
.=$J}G&4W
&&?iG)
(#3UQ(
""<:)
$7_w$:eZ$0RG$
!&=fc)
&8^l%&DI#
:%(FD#=o[ S
2$9dF)
,#Ex5
'#@n5
"!(F_
-myZ#XkI
BRCHYC&cxH6u}eF
*)ABO@
&H}(%$LJ"
3&8WV#
?&;zc#
!$5ZdG
&19Y
O"4I2(
%/D,'
+$1O<"TiP#gwd!x
q#\n\"A_E)
; If a previous statment was active then restore it
Colors <?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v04-Aug-2015.cvs</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>
NullsoftInst.*
3mQ`/ 
o&}BK.-
^kun;P%
U-LyhY
zyRQznuE
cHrX_:
F!(T(%A
bV=t_7d0
[/,vH!
fo&?~0u
ClQGcA
3H.{p~
h)\1+~n
P`sX]I
Z-e}ma*
K42w>+
5O)g_:
VcJnI7
K ;S}u
/iHU<
R)%odr
N VbmC
OjJAT6
l@dV,R
Q!bKzH
0|If6S
bRIp\#
/`Iq@,'
IgmbKx
t'>u1]
>}z]Do
B8eH],
*~kHy54
mC26`6
AZZ(F/
5nv?u
.};>T>Dhf
9z|Ce$
6^e{4&^7
f\"v
k|/&:|(
[Dqks94K
#F]2_c3
ovKd]o#
;o{97Lk
ut4YGdD{
9Qd25<
sZ:M[r
Z4ROz1
~o$mB$y
"y{8~f
nhKYLm
maB!CTaH
^h(-[{S
NO0ep[
. 9O")
R>[uYp
jl!BjW
H&Ul'tY
l%h5Ak
t$a4G\xi
hOpBG_
D_]K~l
BhCB@j
Gtb4\7<
!s"R-(
fOM<<q
i!)#=;
I61<U{|
L$YF$a
{SQUH*zcv
NX'6WJE\pT
sVX]gc
$T#*W;
P9=0Hq
[?+CuBY*
Sn#&d[
5x9NH>
4dT=D.
*S\\Y=
ZlJyh+
a.0A4.
[tA.9!
Naw*'=
*~kHy54
>L"p,L
2xs~6;LNL,
0a&H#3"
]&1/\O
9BlRoH
tf@.C
x?/WVr
W5yUt7w
F4Y8~4h[
k/a)}^(
mETyQC>
/tEF!~
{4h=Er
*`o"j'
ITsW|3!
1._[1O
*`eWf3
@<UgTI
bbnFW;&]
0!$ERk
D]<?m2rFp
b=RwW9
z-L[{0
<Z\/Ia~
UJyF >
gDTy`oj
YRE~jX
O??(z$
zG1Vto
y7&:>
t>:T4j
'y(r**
5c\tGeTz0
P)#cW.
d7a*'`
Tko;nG
'#{X0S
{"-mKg]>
jF'6l8
PZ{4n0
pY\RsrcyQ
lb's!7?
j2^$zN
8=(GV[
,S9'hd
qvq8=>
,l&]oN
o3?.qcs$
kBs.8q
a7 G$HU
ZIeC84.
O@4x!"
twn6-B
p"5OW00
}-@V&6
M<{lm0
(&in=N
v_1ioe
E'!RnbM
CWu]k>
>C'a@\
LH8MI8
%cPvJP
]'L/lA
=UYC".
4]yn~n
[7UTJC
\>R&:~
AsnN6fP
fV>q[z
c*1@lb
xDb/3&
r'FWni
F=:VlqVS
iBJ<BK
g_AEG$
_5lyR}
3K-c*)
h;@UGa
HS="eK
h1x/jZ
!dEvOr
5x^~*g
23OoA?
:rekMV
}(d9v+`
;Q>o8{
R"0:[kC
0MUGBn
8J(_,ZZ
9;bn#\
D5wJcQ
i,O4=*
G'=Grb
"*6]<w
d 7PQ
Yme+OW
p]>]LQ
2}15 p
AGdRc8*
{n5~]:
J9sc."1
}}gGlql
ATx:v#gU
>W!Y9s
dusLf
93sA.&
tG_L(p
_*4r.K
`_k8WA
dykVFF>
me0 Qr
Ms}_h<
)=3=F
FK>x6/
:uQ8gF
+L J+3
iGh$7>r*n
vmwS?0
?"B~.)D
GEU /b
XBj,vFgF
)^|*xm
U>.3g;
Eai/JyM
CZi*n+
9DhSpd
PVq!22
W-50n;X=@H
`etvi-
b<uqaS
^5}L45A
Gn>)FK
Fk3tGq
}COSV(L
mcL-CF
,/*|P{
V`c<~.v;
>]7vPN
wc4wBw
2YFrD
UO!D\
hv_k_R
Le,&>
[o'3F7
fTBbz6iE!
6 MAHX
+RByA[
@1Wyx1E
e\ZkLl
_rb]cMDBw
WqKRq~
Af{l1Yl
3zVU&;
U6f+O#S7
A`kzK4T
ho||`;bK
hWV@6w
)(s"44]
OzxHJ?Yf
L<KcUp8
HeZCG'
pz]wPAtlR(
UvMUi.
VeriSign, Inc.10
VeriSign Trust Network1;09
2Terms of use at https://www.verisign.com/rpa (c)101.0,
%VeriSign Class 3 Code Signing 2010 CA0
151222000000Z
190321235959Z0g1
California1
San Jose1
DownloadShield1
DownloadShield0
http://sf.symcb.com/sf.crl0f
https://d.symcb.com/cps0%
https://d.symcb.com/rpa0
http://sf.symcd.com0&
http://sf.symcb.com/sf.crt0
qJ5T}<g
U^i] zG
VeriSign, Inc.10
VeriSign Trust Network1:08
1(c) 2006 VeriSign, Inc. - For authorized use only1E0C
<VeriSign Class 3 Public Primary Certification Authority - G50
100208000000Z
200207235959Z0
VeriSign, Inc.10
VeriSign Trust Network1;09
2Terms of use at https://www.verisign.com/rpa (c)101.0,
%VeriSign Class 3 Code Signing 2010 CA0
https://www.verisign.com/cps0*
https://www.verisign.com/rpa0
[0Y0W0U
image/gif0!00
#http://logo.verisign.com/vslogo.gif04
#http://crl.verisign.com/pca3-g5.crl04
http://ocsp.verisign.com0
VeriSignMPKI-2-80
VeriSign, Inc.10
VeriSign Trust Network1;09
2Terms of use at https://www.verisign.com/rpa (c)101.0,
%VeriSign Class 3 Code Signing 2010 CA
YT"DNJ
SNws)(
Symantec Corporation10
Symantec Trust Network100.
'Symantec Class 3 SHA256 Code Signing CA0
151222000000Z
190321235959Z0g1
California1
San Jose1
DownloadShield1
DownloadShield0
CUTMU=
http://sv.symcb.com/sv.crl0f
https://d.symcb.com/cps0%
https://d.symcb.com/rpa0
http://sv.symcd.com0&
http://sv.symcb.com/sv.crt0
VeriSign, Inc.10
VeriSign Trust Network1:08
1(c) 2006 VeriSign, Inc. - For authorized use only1E0C
<VeriSign Class 3 Public Primary Certification Authority - G50
131210000000Z
231209235959Z0
Symantec Corporation10
Symantec Trust Network100.
'Symantec Class 3 SHA256 Code Signing CA0
+ojr\`
http://s2.symcb.com0
http://www.symauth.com/cps0(
http://www.symauth.com/rpa00
http://s1.symcb.com/pca3-g5.crl0
SymantecPKI-1-5670
Symantec Corporation10
Symantec Trust Network100.
'Symantec Class 3 SHA256 Code Signing CA
/Y&v1V?
Af$; lq
RkgYLr
20180328055459Z0
Symantec Corporation10
Symantec Trust Network110/
(Symantec SHA256 TimeStamping Signer - G3
VeriSign, Inc.10
VeriSign Trust Network1:08
1(c) 2008 VeriSign, Inc. - For authorized use only1806
/VeriSign Universal Root Certification Authority0
160112000000Z
310111235959Z0w1
Symantec Corporation10
Symantec Trust Network1(0&
Symantec SHA256 TimeStamping CA0
https://d.symcb.com/cps0%
https://d.symcb.com/rpa0.
http://s.symcd.com06
%http://s.symcb.com/universal-root.crl0
TimeStamp-2048-30
Symantec Corporation10
Symantec Trust Network1(0&
Symantec SHA256 TimeStamping CA0
171223000000Z
290322235959Z0
Symantec Corporation10
Symantec Trust Network110/
(Symantec SHA256 TimeStamping Signer - G30
?'J3Nm
https://d.symcb.com/cps0%
https://d.symcb.com/rpa0@
/http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
http://ts-ocsp.ws.symantec.com0;
/http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
TimeStamp-2048-60
U){9FN
Symantec Corporation10
Symantec Trust Network1(0&
Symantec SHA256 TimeStamping CA
180328055459Z0/
/1(0&0$0"
MS SHELL DLG
Decline
MS Shell Dlg
msctls_progress32
SysListView32
MS Shell Dlg
Please wait while Setup is loading...
Antivirus Signature
Bkav Clean
Elastic Clean
MicroWorld-eScan Adware.GenericKD.30613374
FireEye Generic.mg.8860fecf9a64e193
CAT-QuickHeal Trojan.Agent
Qihoo-360 Win32/Virus.Adware.74b
McAfee Artemis!8860FECF9A64
Cylance Unsafe
VIPRE DownloadShield (fs)
K7AntiVirus Adware ( 004df08d1 )
BitDefender Adware.GenericKD.30613374
K7GW Adware ( 004df08d1 )
Cybereason malicious.f9a64e
BitDefenderTheta Clean
Cyren Clean
Symantec Trojan Horse
TotalDefense Clean
Baidu Clean
APEX Malicious
Paloalto Clean
ClamAV Win.Malware.Score-6931191-0
Kaspersky not-a-virus:HEUR:AdWare.Win32.Downware.gen
Alibaba AdWare:Win32/DownWare.ba7a771e
NANO-Antivirus Trojan.Win32.StartPage.esqoia
ViRobot Clean
AegisLab Adware.Win32.Downware.2!c
Avast FileRepMalware
Tencent Win32.Adware.Downware.Eawu
Ad-Aware Adware.GenericKD.30613374
TACHYON Clean
Emsisoft Application.InstallAd (A)
Comodo ApplicUnwnt@#avud7zvby13y
F-Secure Heuristic.HEUR/AGEN.1117529
DrWeb Adware.Downware.16961
Zillya Adware.Downware.Win32.169
TrendMicro TROJ_GEN.R002C0OA321
McAfee-GW-Edition Artemis!PUP
CMC Clean
Sophos DownWare (PUA)
Ikarus PUA.DownWare
GData Adware.GenericKD.30613374
Jiangmin AdWare.Downware.g
Webroot Pua.Downloadshield
Avira HEUR/AGEN.1117529
Antiy-AVL RiskWare[Downloader]/Win32.AGeneric
Kingsoft Clean
Gridinsoft Adware.DownWare.vl!c
Arcabit Adware.Generic.D1D31F7E
SUPERAntiSpyware PUP.Downware/Variant
ZoneAlarm not-a-virus:HEUR:AdWare.Win32.Downware.gen
Microsoft PUA:Win32/Vittalia
Cynet Malicious (score: 85)
AhnLab-V3 PUP/Win32.Downware.R182412
Acronis Clean
VBA32 Adware.OpenDownloadManager
ALYac Adware.GenericKD.30613374
MAX malware (ai score=97)
Malwarebytes PUP.Optional.DownWare
Zoner Clean
ESET-NOD32 Win32/DownWare.AR potentially unwanted
TrendMicro-HouseCall TROJ_GEN.R002C0OA321
Rising Clean
Yandex Clean
SentinelOne Clean
eGambit Clean
Fortinet Adware/Downware
AVG FileRepMalware
Panda Trj/Genetic.gen
CrowdStrike win/malicious_confidence_60% (D)
MaxSecure Clean
No IRMA results available.