Static | ZeroBOX

PE Compile Time

2021-07-02 17:37:53

PE Imphash

64f1814b769b7e8d7e61f45d0e9f5051

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0004c25f 0x0004c400 7.16461266551
.rdata 0x0004e000 0x00000296 0x00000400 3.38075276534
.data 0x0004f000 0x00001c50 0x00001c00 5.69303656319
.text4 0x00051000 0x00000bb8 0x00000c00 4.9562439466
.text3 0x00052000 0x00000bb8 0x00000c00 4.9562439466
.text2 0x00053000 0x00000bb8 0x00000c00 4.9562439466
.rsrc 0x00054000 0x00000e80 0x00001000 4.45982255558

Resources

Name Offset Size Language Sub-language File type
RT_BITMAP 0x000540e8 0x00000728 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_RCDATA 0x00054810 0x0000035c LANG_ENGLISH SUBLANG_ENGLISH_US ASCII text, with CRLF line terminators
RT_VERSION 0x00054b6c 0x00000314 LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library KERNEL32.dll:
0x44f9a4 CreateFileW
0x44f9a8 GetModuleFileNameA
0x44f9b4 LocalFree
0x44f9b8 FormatMessageA
0x44f9bc GetLastError
0x44f9c0 CloseHandle
0x44f9c4 GetExitCodeProcess
0x44f9c8 WaitForSingleObject
0x44f9cc CreateProcessA
0x44f9d0 GetCommandLineA
0x44f9d4 GetProcAddress
0x44f9d8 GetModuleHandleA
0x44f9dc LoadLibraryA
0x44f9e0 GetExitCodeThread
0x44f9e4 FindFirstFileA
0x44f9e8 FindNextFileA
0x44f9ec FindClose
0x44f9f0 HeapSetInformation
0x44f9fc GetModuleHandleW
0x44fa00 ExitProcess
0x44fa04 DecodePointer
0x44fa10 GetDriveTypeA
0x44fa14 FindFirstFileExA
0x44fa18 MultiByteToWideChar
0x44fa1c GetFileAttributesA
0x44fa20 ExitThread
0x44fa24 GetCurrentThreadId
0x44fa28 CreateThread
0x44fa2c HeapAlloc
0x44fa30 HeapReAlloc
0x44fa34 HeapFree
0x44fa38 Sleep
0x44fa3c GetCPInfo
0x44fa48 GetACP
0x44fa4c GetOEMCP
0x44fa50 IsValidCodePage
0x44fa58 WriteFile
0x44fa5c GetStdHandle
0x44fa60 GetModuleFileNameW
0x44fa68 WideCharToMultiByte
0x44fa70 SetHandleCount
0x44fa78 GetFileType
0x44fa7c GetStartupInfoW
0x44fa84 EncodePointer
0x44fa88 TlsAlloc
0x44fa8c TlsGetValue
0x44fa90 TlsSetValue
0x44fa94 TlsFree
0x44fa98 SetLastError
0x44fa9c HeapCreate
0x44faa0 GetTickCount
0x44faa4 GetCurrentProcessId
0x44fab0 IsDebuggerPresent
0x44fab4 TerminateProcess
0x44fab8 GetCurrentProcess
0x44fac0 LoadLibraryW
0x44fac4 RtlUnwind
0x44fac8 GetFullPathNameA
0x44fad0 PeekNamedPipe
0x44fad4 CreateFileA
0x44fadc GetConsoleCP
0x44fae0 GetConsoleMode
0x44fae4 FlushFileBuffers
0x44faf0 SetStdHandle
0x44faf4 LCMapStringW
0x44faf8 GetStringTypeW
0x44fafc SetFilePointer
0x44fb00 CompareStringW
0x44fb04 HeapSize
0x44fb08 ReadFile
0x44fb0c GetDriveTypeW
0x44fb10 SetEndOfFile
0x44fb14 GetProcessHeap
0x44fb1c WriteConsoleW
0x44fb20 SearchPathA
0x44fb24 SetConsoleOutputCP
0x44fb28 GetTapePosition
0x44fb2c GlobalFindAtomW
0x44fb34 GetTapeStatus
0x44fb38 IsValidLocale
0x44fb44 ConnectNamedPipe
0x44fb48 Thread32Next
0x44fb4c MapViewOfFile
0x44fb50 RaiseException
0x44fb54 SetPriorityClass
0x44fb58 _lopen
0x44fb5c BackupWrite
0x44fb60 FormatMessageW
0x44fb64 LocalAlloc
0x44fb68 FreeLibrary
0x44fb70 GetConsoleOutputCP
Library USER32.dll:
0x44fb78 MessageBoxA
0x44fb80 LoadMenuW
0x44fb84 GetClipboardViewer
0x44fb88 ShowScrollBar
0x44fb90 PostMessageA
0x44fb94 DdeKeepStringHandle
0x44fb98 GetScrollInfo
0x44fb9c AnyPopup
0x44fba0 DrawTextExW
0x44fba4 VkKeyScanExW
0x44fbac SetLastErrorEx
0x44fbb0 EndTask
0x44fbb8 PostMessageW
0x44fbbc IMPGetIMEW
0x44fbc0 PackDDElParam
0x44fbc4 OpenInputDesktop
0x44fbc8 GetMenuStringW
0x44fbcc UpdateWindow
0x44fbd0 wvsprintfW
0x44fbd4 GetMenuItemInfoA
0x44fbd8 DialogBoxParamA
0x44fbdc MessageBoxIndirectW
0x44fbe0 ValidateRect
0x44fbe4 IntersectRect
0x44fbe8 IsCharAlphaA
0x44fbec SetMenuDefaultItem
0x44fbf0 GetKeyNameTextW
0x44fbf4 IsWindowEnabled
0x44fbf8 SetClassLongW
0x44fbfc LoadMenuIndirectA
0x44fc00 CharPrevW
0x44fc04 ShowWindowAsync
0x44fc08 SetRect
0x44fc0c OemToCharA
0x44fc10 DeferWindowPos
0x44fc14 SendMessageTimeoutW
0x44fc18 LoadStringW
0x44fc1c GetKeyState
0x44fc20 GetClipboardData
Library GDI32.dll:
0x44fc28 GdiSwapBuffers
0x44fc2c SetBrushOrgEx
0x44fc30 EqualRgn
0x44fc34 EngDeletePath
0x44fc38 StartDocA
0x44fc40 GdiStartDocEMF
0x44fc48 GetETM
0x44fc4c GdiEntry10
0x44fc54 DeleteMetaFile
0x44fc58 PATHOBJ_vGetBounds
0x44fc64 BitBlt
0x44fc6c FONTOBJ_vGetInfo
0x44fc70 GetMapMode
0x44fc74 Rectangle
0x44fc78 ResetDCA
0x44fc7c SetWorldTransform
0x44fc80 ResizePalette
0x44fc84 GetObjectA
0x44fc88 PolyTextOutW
0x44fc8c GdiFixUpHandle
0x44fc90 EngUnlockSurface
0x44fc94 GetStockObject
0x44fc98 GetStretchBltMode
0x44fc9c GetEnhMetaFileBits
Library ADVAPI32.dll:
0x44fca4 RegQueryValueExA
0x44fca8 RegCloseKey
0x44fcac RegOpenKeyExA
0x44fcb0 RegEnumKeyA
0x44fcb4 RegOpenKeyA
Library SHELL32.dll:
0x44fcbc SHFreeNameMappings
0x44fcc0 ShellExecuteExW
0x44fcc8 SHEmptyRecycleBinW
0x44fccc SHGetFolderLocation
Library SHLWAPI.dll:
0x44fcd4 StrRChrW
0x44fcd8 StrRStrIA
0x44fcdc PathCanonicalizeW
0x44fce0 PathIsRootW
0x44fce4 PathIsDirectoryW
Library COMCTL32.dll:

!This program cannot be run in DOS mode.
`.rdata
@.data
.text4
.text3
.text2
[sR1O0
2!p"^":
5MO[2/`
nAlzmc
ViLwua:Ere;
Unm?sVi;tOf jle
kduzeHapfle
peareFireA
SCwFi2fPo
Wr7weF
Dre{NibLdry
gn {LS
e?6^]D
fusDGz
;D$P]8v
!CDx>`N
2dE""h
!y!A"l'P
4x<G"j!P
LkHp\y
2hFWo5
U{585'G
1J&PC1w
[zuH P
M-=Ej~
2dP&5
g=EWeGh=
HCN\\z
APZp~E
bf=.azG+=
UUf=5kq
\&="em1
1D"b~5H
uQ Pheu
$Wf=u[qG
p5a_Cj
z=|]r=
G#3pq(
7.Xv1;L
;9`&P9
xhY#P^
-=5c)5
9`"%z5
Pf;#Ev
dz5y7nG
596nP
+DCNo-,1h
="]`G8E
f3sq)Q
xi5CxE
5y2@P5
2X_X&5
G\I){8
J[j3a(
;9 &P*
[v<ir1
|m}`5x
y0@\~0,
-1)4k1)4_PG
J~,Z1D
SV7wS&
@$P7nu
5^9|4X!
$3(p#58
g9``j~K
nY#10mv
0DN_({q
~T{3-A&3
%3@M%3(
x D@T}X<S
uSpx0T
h9 bj~
!HvT]18f
u50m$5@
N 3!>!
GnX,5-
T 31pp
m%5xd%5
<T 31>!
G6WyG(
F7mq0A+7
~r3JM~K~Wy
Gx D~D
P*sB~E
:7"P~M
vz `>F
)C`&'C`v,
w.2`.1Sb
|8XPyv
$v8D~:
r1:P~K
ff'S`f'sg
)Cf&(Cf
3@.{rf=
F4!m3C
`yoZBb~
XPvB=
8@> sw
y?RBB~
ynXBC.
ES8L._
3u3H(Bj
ysGfyt
@%Gg@%Gf@%G
8Db@Bu^
Sq1Cke2
w3%J,=
G\o({8|
=}P-4u
c}PY0u
fePN4u
m}P~&u
e}P#2u
d}P u
xo=Edp
Bxbo({
`q3}x0H
-x0L>>
5OJ>Ihr
*0Df,Z
e3zB'qv<
m3zL'S
<HJzj@$5
^}VzOD
2<|e]3
Jco1:woS/
Dx.K({(
\oG>^}
]e1DH'q
"3!ADGx
H.=ETn3
tylT{;
3=|2]^
t~<Rg;
.Uw1M
bC,q6G
5I4{PF
xmSvx]
t=um=3
[p1{\0
DxnDw1
wG\iB|
t=u4R3:V
t=uZ~3*
ZmSyX'
GBZm5y
5P%q6H
1pdRG"ax17
"31C&;Z
s58$#3
s5xl#3%}*
s3"~2t
z5x\#P!r
G5~2 E~2
E~2d5~2t5~
/DQULy`
.TDq~Z
F#PqWs
GxRx=k
V"aDGL
i;#bx<@
t5H%#G
5H$#GH
@6Rw="
/XVH4Q
^58^#P d
pR%3DPDx6
:Dq,2w
3%K+=+
H+=+T.5x
}"tN:|3
mNN3zx|
$58-#5H
O|38)}
y245z2t5|
"58t#58
_=.^71a
Cxr=)3
.5Qt38P
(SdPm
I@dQd;@
ue_GHY
Ge]<5ew2{
R=Qt;9
QDb~;&Tu=
y(Y28Q
9DLCl3
s;I6Ax
b=5^o;
\B>Hx1`
sS,XtGH
;AAG<7
=3Dl'{O
7>#D(G
d=ul|G
foPnzt
tFlvn3
nc|3,
ZIIpmKD
?p3N.@&
X03<0@
|bADnm
sS&?Dc
UWP?9s
G\`Q3p
c=ua{G
G"J.Gx
[];@=M
G\$Q3pq
6DrJDunx
NnXg0Qo;
4u+x"`*10l@N
H.=u04?
IyEG"\
H]"jX=Yt
<]"qX`
0]"pX=Yr
t~4+H]
(P`BDphJD
}ytV_P
c=,dvPp
Exr;x#
c=EFG3
3Ezm2Fy-
@7Fm8C
L|zmRs
L}yM5{O
^8TVc5{
s8SWt<
Eez3xX
l3(^-Q
FTcSeC
\}Oc(>
P%BDp-JD
thpGS;~
{HyK+HK
9w3y9{i
(%#P}q
}7 =Ei&
0&=u\j1
?nds3
B{=Gb*
G\w*\zS
;`u3;B$G
{_u3{A$G
@GgF5y
ewG+Y*@>
]Z2H"cKG
4w3:V/
zpKeG>e
Dj8ix'wd
Djxgx'
Dj8fx'wc
z0GeG.a
Cj8dx'G
R+/G2+6G^
DNxbx=Km
Dj8ix'w
z0:eG.d
zP<eGnb
CjHfx'
zpGeGNa
Jxdx=Kf
z0EeGH
G"xYNB
JHbx=se
z0BeG.d
Vlq~V&Q
5J&1Hi
~UGHl
mS*BElZld
&5x{G
8Vx<2c
G6L[Sb
tO}Q%{.
CaG"II
@,JGC)7
@/TtS.
*l<DV3
a{*l.JZy
y2l.Hf
v^1Ex*l
v* ~Rv
v2TNSv
mv2lV;r1
Ex* f9b1
JGEQn3p\
JG5Sn3p_
SMGuQny
JGuQn3
JGuQn3
r0t_?x
TuF?cLD^
F?c<lv
@Gzz*@
G;}:d$
Dx.k(3
T~5Z30
Cc<*?x
"Gv=El
XFGGh
;Ejo1`
Alda;5
3>=,)83
O4>*=2"
{Q5<=[
Wp"ERs,RqNO
yP_/6E
xrZm2w
jlv8X!=
p(@lXy8
P3tY9#
~'0scQ
K.^6Gsx|bI]i
d$=q!r
h^yb;F
VS/y6^~
/J#-4E&#
^ '!e
2==+943
]QMLh_
;%#5M.
LNu)}K`;v
iR8|hE1
imZ%Z`a3ww
fN]=_<f0$
4X<)O%-
qem)|lo
HHgZUSa
BKE=DN<4F
5Sm8ESm
-d1.9K&OC$
;}8wV`
VU|CY*V
tVGXXf3
G@B>q4F75
pM9/G(
wVurZ]t
wqoU%(DPB@I1
AU\dmZck
Q`r^yx XHG
$(UqH4Ry
kekas$\ody
oi$siXbhfNi`nT[
&ruqwhm
Fg[rZvr
#imVZT-
hbt^b]
d^wq"psZu[o
f`tNc]
w^t`g^l'lTr
L22'301
L22'201
L22'101
L22'001
L22'/01
L22'.01
L22'-01
akeKjqe
4eSeke48htng`l4ebt^S]
hkidacS
M`skJqr
kae5dpNoUoF
8jkS^0keR
hmjFrF
2UoeS`n
kBoJnkee
DkkUah`n[lTd:8be
3hoaFhl
yhqtJ`cPenkeT3
FiU3daS
N_Xdkm
re[1reUi`toaqr
Ocj>htG
Y\er`gyw
TfVnfa
kernel32
kernel32
kernel32
kernel32
kernel32
kernel32
kernel32
kernel32
55GVf9VAMqauOo0b24JxJgxSub9jbyfIjeseTShU0utyv5HA
33vapi32
RegQueryValueExA
VirtualAlloc
kernel32
GetModuleHandleW
kernel32
CreateFileW
GetModuleFileNameA
QueryPerformanceCounter
QueryPerformanceFrequency
LocalFree
FormatMessageA
GetLastError
CloseHandle
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetCommandLineA
GetProcAddress
GetModuleHandleA
LoadLibraryA
GetExitCodeThread
FindFirstFileA
FindNextFileA
FindClose
HeapSetInformation
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
ExitProcess
DecodePointer
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
MultiByteToWideChar
GetFileAttributesA
ExitThread
GetCurrentThreadId
CreateThread
HeapAlloc
HeapReAlloc
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
SetUnhandledExceptionFilter
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
HeapCreate
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
LoadLibraryW
RtlUnwind
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
CreateFileA
GetCurrentDirectoryW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetEnvironmentVariableW
SetEnvironmentVariableA
SetStdHandle
LCMapStringW
GetStringTypeW
SetFilePointer
CompareStringW
HeapSize
ReadFile
GetDriveTypeW
SetEndOfFile
GetProcessHeap
GetTimeZoneInformation
WriteConsoleW
SearchPathA
SetConsoleOutputCP
GetTapePosition
GlobalFindAtomW
WriteConsoleOutputAttribute
GetTapeStatus
IsValidLocale
GetDefaultCommConfigA
GetPrivateProfileSectionA
ConnectNamedPipe
Thread32Next
MapViewOfFile
RaiseException
SetPriorityClass
_lopen
BackupWrite
FormatMessageW
LocalAlloc
FreeLibrary
SetConsoleCtrlHandler
GetConsoleOutputCP
KERNEL32.dll
MessageBoxA
CreateIconFromResource
LoadMenuW
GetClipboardViewer
ShowScrollBar
SetUserObjectInformationA
PostMessageA
DdeKeepStringHandle
GetScrollInfo
AnyPopup
DrawTextExW
VkKeyScanExW
ChangeDisplaySettingsExW
SetLastErrorEx
EndTask
GetProcessWindowStation
PostMessageW
IMPGetIMEW
PackDDElParam
OpenInputDesktop
GetMenuStringW
UpdateWindow
wvsprintfW
GetMenuItemInfoA
DialogBoxParamA
MessageBoxIndirectW
ValidateRect
IntersectRect
IsCharAlphaA
SetMenuDefaultItem
GetKeyNameTextW
IsWindowEnabled
SetClassLongW
LoadMenuIndirectA
CharPrevW
ShowWindowAsync
SetRect
OemToCharA
DeferWindowPos
SendMessageTimeoutW
LoadStringW
GetKeyState
GetClipboardData
USER32.dll
GdiSwapBuffers
SetBrushOrgEx
EqualRgn
EngDeletePath
StartDocA
GetTextExtentPoint32A
GdiStartDocEMF
ModifyWorldTransform
GetETM
GdiEntry10
GdiGetDevmodeForPage
DeleteMetaFile
PATHOBJ_vGetBounds
XLATEOBJ_cGetPalette
GdiConvertMetaFilePict
BitBlt
EngGetPrinterDataFileName
FONTOBJ_vGetInfo
GetMapMode
Rectangle
ResetDCA
SetWorldTransform
ResizePalette
GetObjectA
PolyTextOutW
GdiFixUpHandle
EngUnlockSurface
GetStockObject
GetStretchBltMode
GetEnhMetaFileBits
GDI32.dll
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegEnumKeyA
RegOpenKeyA
ADVAPI32.dll
SHFreeNameMappings
ShellExecuteExW
SHPathPrepareForWriteW
SHEmptyRecycleBinW
SHGetFolderLocation
SHELL32.dll
StrRChrW
StrRStrIA
PathCanonicalizeW
PathIsRootW
PathIsDirectoryW
SHLWAPI.dll
InitCommonControlsEx
COMCTL32.dll
[sR1O0
2!p"^":
[sR1O0
2!p"^":
[sR1O0
2!p"^":
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
<dependency>
<dependentAssembly>
<assemblyIdentity type="win32" name="Microsoft.VC90.DebugCRT" version="9.0.21022.8" processorArchitecture="x86" publicKeyToken="1fc8b3b9a1e18e3b"></assemblyIdentity>
</dependentAssembly>
</dependency>
<dependency>
<dependentAssembly>
<assemblyIdentity type="win32" name="Microsoft.VC90.DebugMFC" version="9.0.21022.8" processorArchitecture="x86" publicKeyToken="1fc8b3b9a1e18e3b"></assemblyIdentity>
</dependentAssembly>
</dependency>
</assembly>
MZJVESLENZVLRPQFZD0
210701080603Z
391231235959Z0
MZJVESLENZVLRPQFZD0
MZJVESLENZVLRPQFZD
DigiCert Inc1
www.digicert.com110/
(DigiCert SHA2 Assured ID Timestamping CA0
210101000000Z
310106000000Z0H1
DigiCert, Inc.1 0
DigiCert Timestamp 20210
http://www.digicert.com/CPS0
,http://crl3.digicert.com/sha2-assured-ts.crl02
,http://crl4.digicert.com/sha2-assured-ts.crl0
http://ocsp.digicert.com0O
Chttp://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
QJxy6z'
dwc_#Ri
DigiCert Inc1
www.digicert.com1$0"
DigiCert Assured ID Root CA0
160107120000Z
310107120000Z0r1
DigiCert Inc1
www.digicert.com110/
(DigiCert SHA2 Assured ID Timestamping CA0
fnVa')
http://ocsp.digicert.com0C
7http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
4http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
4http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
https://www.digicert.com/CPS0
8aMbF$
V3"/"6
MZJVESLENZVLRPQFZD
,https://www.example.com/my_product/info.html0
DigiCert Inc1
www.digicert.com110/
(DigiCert SHA2 Assured ID Timestamping CA
210702083812Z0/
VS_VERSION_INFO
StringFileInfo
000904B0
CompanyName
Mightywill
FileVersion
2,0,36,0
InternalName
Mightywill.QA.CrashReport.exe
LegalCopyright
2011 Mightywill
OriginalFilename
Mightywill.QA.CrashReport.exe
ProductName
Common
ProductVersion
2,0,36,0
Platform
VarFileInfo
Translation
<<<Obsolete>>
Antivirus Signature
Bkav W32.AIDetect.malware1
Elastic malicious (high confidence)
DrWeb Clean
MicroWorld-eScan Gen:Variant.Graftor.972339
CMC Clean
CAT-QuickHeal Clean
ALYac Gen:Variant.Ulise.248204
Cylance Unsafe
Zillya Clean
AegisLab Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Clean
BitDefender Gen:Variant.Graftor.972339
K7GW Clean
CrowdStrike win/malicious_confidence_80% (W)
BitDefenderTheta Gen:NN.ZexaF.34790.uC1@aWQrinii
Cyren W32/Kryptik.EMS.gen!Eldorado
Symantec Packed.Generic.459
ESET-NOD32 a variant of Win32/Kryptik.HLON
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002C0WG221
Avast Win32:DangerousSig [Trj]
ClamAV Clean
Kaspersky UDS:DangerousObject.Multi.Generic
Alibaba Trojan:Win32/Kryptik.c63abde4
NANO-Antivirus Clean
ViRobot Clean
Rising Clean
Ad-Aware Gen:Variant.Graftor.972339
Emsisoft Gen:Variant.Graftor.972339 (B)
Comodo Clean
F-Secure Clean
Baidu Clean
VIPRE Clean
TrendMicro TROJ_GEN.R002C0WG221
McAfee-GW-Edition Artemis!Trojan
FireEye Generic.mg.1fa2d8db24799c93
Sophos ML/PE-A
Ikarus Win32.Outbreak
GData Gen:Variant.Graftor.972339
Jiangmin Clean
MaxSecure Clean
Avira Clean
MAX malware (ai score=80)
Antiy-AVL Trojan/Generic.ASCommon.1BE
Kingsoft Win32.Troj.Generic_a.a.(kcloud)
Gridinsoft Clean
Arcabit Trojan.Fugrafa.D2537E
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Wacatac.B!ml
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.Agent.R429033
Acronis suspicious
McAfee RDN/Generic.rp
TACHYON Clean
VBA32 BScope.Exploit.CVE-1999-0016
Malwarebytes Clean
Panda Clean
APEX Malicious
Tencent Clean
Yandex Clean
SentinelOne Static AI - Suspicious PE
eGambit Clean
Fortinet W32/Kryptik.HLON!tr
Webroot Clean
AVG Win32:DangerousSig [Trj]
Cybereason malicious.86e275
Paloalto generic.ml
Qihoo-360 Win32/Heur.Generic.HxMBUxsA
No IRMA results available.