Static | ZeroBOX

PE Compile Time

2021-08-02 08:05:28

PDB Path

C:\xampp\htdocs\Cryptor\0238f0732c6a40e5a54bccb37ef03c58\Loader\Project1\Release\Project1.pdb

PE Imphash

589aee860f84814af33b4e1068b97d01

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000c727 0x0000c800 6.58406005162
.rdata 0x0000e000 0x00005ac6 0x00005c00 4.93015425606
.data 0x00014000 0x000019c8 0x00001000 3.41532208548
.gfids 0x00016000 0x000000ac 0x00000200 1.44064934011
.rsrc 0x00017000 0x0000eb38 0x0000ec00 1.8711448419
.reloc 0x00026000 0x0000107c 0x00001200 6.36802237044

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x000170f0 0x0000e8ac LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x000259a0 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x000259b8 0x0000017d LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library KERNEL32.dll:
0x40e04c SetStdHandle
0x40e050 GetFileType
0x40e054 GetStringTypeW
0x40e058 GetProcessHeap
0x40e05c HeapSize
0x40e060 FlushFileBuffers
0x40e064 GetConsoleCP
0x40e068 GetConsoleMode
0x40e06c SetFilePointerEx
0x40e070 WriteConsoleW
0x40e074 DecodePointer
0x40e078 VirtualProtect
0x40e07c CloseHandle
0x40e084 CreateFileW
0x40e088 LCMapStringW
0x40e08c WriteFile
0x40e094 GetCurrentProcessId
0x40e098 GetCurrentThreadId
0x40e0a0 InitializeSListHead
0x40e0a4 IsDebuggerPresent
0x40e0b0 GetStartupInfoW
0x40e0b8 GetModuleHandleW
0x40e0bc GetCurrentProcess
0x40e0c0 TerminateProcess
0x40e0c4 RtlUnwind
0x40e0c8 GetLastError
0x40e0cc SetLastError
0x40e0e0 TlsAlloc
0x40e0e4 TlsGetValue
0x40e0e8 TlsSetValue
0x40e0ec TlsFree
0x40e0f0 FreeLibrary
0x40e0f4 GetProcAddress
0x40e0f8 LoadLibraryExW
0x40e0fc GetStdHandle
0x40e100 GetModuleFileNameW
0x40e104 MultiByteToWideChar
0x40e108 WideCharToMultiByte
0x40e10c ExitProcess
0x40e110 GetModuleHandleExW
0x40e114 GetACP
0x40e118 HeapFree
0x40e11c HeapAlloc
0x40e120 HeapReAlloc
0x40e124 FindClose
0x40e128 FindFirstFileExW
0x40e12c FindNextFileW
0x40e130 IsValidCodePage
0x40e134 GetOEMCP
0x40e138 GetCPInfo
0x40e13c GetCommandLineA
0x40e140 GetCommandLineW
0x40e14c RaiseException
Library USER32.dll:
0x40e154 GetMessageW
0x40e158 DefWindowProcW
0x40e15c DestroyWindow
0x40e160 DispatchMessageW
0x40e164 TranslateMessage
0x40e168 LoadCursorW
0x40e16c GetClientRect
0x40e170 PostQuitMessage
0x40e174 InvalidateRect
0x40e178 BeginPaint
0x40e17c EndPaint
0x40e180 CreateWindowExW
0x40e184 RegisterClassExW
0x40e188 RegisterClassW
0x40e18c SetMenu
0x40e190 AppendMenuW
0x40e194 GetSysColorBrush
0x40e198 CreateMenu
0x40e19c GetDC
0x40e1a0 ReleaseDC
Library GDI32.dll:
0x40e010 CreateCompatibleDC
0x40e014 SetBkColor
0x40e018 SetROP2
0x40e01c ExtTextOutW
0x40e020 GetStockObject
0x40e024 SelectObject
0x40e028 SetPixel
0x40e02c ExtFloodFill
0x40e030 GetDIBits
0x40e034 GetPixel
0x40e038 GetObjectW
0x40e03c DeleteObject
0x40e040 CreateSolidBrush
0x40e044 BitBlt
Library COMDLG32.dll:
0x40e000 ChooseColorW
0x40e004 GetOpenFileNameW

!This program cannot be run in DOS mode.
`.rdata
@.data
.gfids
@.rsrc
@.reloc
u&h(NA
URPQQh
;t$,v-
UQPXY]Y[
j"^f91j\^u8
j"^f9q
t/j=[f;
taj*Xf
VWj\^j:
WWWPWS
PQhHAA
PQhPBA
SSVWh
f9:t!V
QQSWj0j@
tl=HFA
j,hH0A
PPPPPPPP
PPPPPWS
PP9E u:PPVWP
jPj2j2h
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
CorExitProcess
GetCurrentPackageId
LCMapStringEx
LocaleNameToLCID
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
?5Wg4p
%S#[k=
"B <1=
_hypot
_nextafter
C:\xampp\htdocs\Cryptor\0238f0732c6a40e5a54bccb37ef03c58\Loader\Project1\Release\Project1.pdb
.text$mn
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.gfids$x
.gfids$y
.rsrc$01
.rsrc$02
WriteFile
CreateFileW
CloseHandle
EnumLanguageGroupLocalesW
VirtualProtect
KERNEL32.dll
ReleaseDC
CreateMenu
GetSysColorBrush
AppendMenuW
SetMenu
RegisterClassW
RegisterClassExW
CreateWindowExW
EndPaint
BeginPaint
InvalidateRect
PostQuitMessage
GetClientRect
LoadCursorW
TranslateMessage
DispatchMessageW
DestroyWindow
DefWindowProcW
GetMessageW
USER32.dll
CreateSolidBrush
DeleteObject
GetObjectW
GetPixel
GetDIBits
ExtFloodFill
SetPixel
SelectObject
GetStockObject
ExtTextOutW
SetROP2
SetBkColor
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
GDI32.dll
ChooseColorW
GetOpenFileNameW
COMDLG32.dll
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
SetStdHandle
GetFileType
GetStringTypeW
GetProcessHeap
HeapSize
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
DecodePointer
RaiseException
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
!!!!!!!!!!!!!!!`
6!!!!!!!!!!!!!!!"N
KA$S[=S[
_@[@=@-@[\
<_@.S[S[S@6[S
_[L56=6=*
--[S[S$SSS^
&&&&&&&&
<I---*
-=---\
$IA%%%%%%%A
@A%%%%%I$
$LA%%%%%%AI$
6....[\
I$$AYYYY%$
.6=-=6
.6II=.
++++K><
P>>>>E????;;EX
FEE???E
'''''''''
.=@$-6
aT$-...
( ===.
*=6..6=-
3V%%ZR4+
S[[[F(
-=6.."3
3 ,,,,,,,,,A
45 a
++++++++++P
(5$$$$$$$$$
NN)))))NNNNNN?
A, OGHHI
% OGHF*
J A
'''''''''
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
1+101=1
2 333F3R3b3s3
354B4i4q4
5?5G5_5e5
7"7j7s7x7
708>8Y8d8
8D9S9Z9
:$:*:0:6:<:B:I:P:W:^:e:l:s:{:
00+0G0g0u0|0
1B1^1m1y1
1!2-22272^2j2o2t2
3*3/3L3
354O4X4
6 636:6B6[6m6y6
<%=4=J=`=w=~=
=.>5>G>P>
?C?U?[?o?
4$53585I5O5Z5b5m5s5~5
5#6@6n6t6
7`8f8s8
8$9o9k:
;$<5<P<\<m<v<
=)=n=\>f>s>
4*5V5_6
7(7F7P7a7f7{7
;(;-;8;L;W;n;
=j>o>u>z>
?&?S?Z?e?s?z?
0!0)0P0i0x0
1'1,111L1V1r1}1
2!2,21262W2g2
3 3>3a3l3y3
455D5R5o5w5
9+9=9O9a9s9
</=|=T>
272R2]2
2/363=3D3Q3
555G5t5
:<;F;i;s;
<2<I<l<
565<5b5v5Q6p6u6)747D7v7
<)<4<D<
='=1=P=n=
!0=0p0
4D4h4s4
798A8I8Q8Y8w8
=I>f>v>
131?1K1^1}1
2)2<2`2
4S5Y5^5d5u5
:d=g>x>
1f1k1}1
6'6E6S6
888?8D8H8L8P8
2\3o3:4
8K9`9i92:m:
<&<J<f<
1H1W1h1
172E2V2
5+50585w5
66)6K6P6X6
7%7*727Y7^7f7
8)8.868_8g8
9#9+999>9L9Q9_9d9r9w9
:!:&:6:D:
:(;>;D;K;R;^;f;|;
<!=-===K=U=
?#?(?.?7?=?D?O?U?\?c?o?w?
000<0G0R0Y0h0o0
1'1-141;1A1W1f1l1
2*252C2L2U2^2m2x2
3"3)383?3K3R3j3t3
4o4t4|4
515H5O5Y5t5
6d6i6q6
3 3$3(3,3034383<3@3D3H3L3P3T3X3\3`3d3h3l3p3t3x3|3
4 4$4(4,4044484<4@4D4H4L4P4T4X4\4`4d4h4l4p4t4x4|4
48;@;H;L;P;T;X;\;`;d;l;p;t;x;|;
= =$=X=\=`=d=h=l=p=t=x=|=
< <$<(<,<0<4<8<<<@<D<H<L<P<T<X<\<`<d<h<l<p<t<x<
= =$=(=,=0=D=L=T=\=d=l=t=|=
>$>,>4><>D>L>T>\>d>l>t>|>
?$?,?4?<?D?L?T?\?d?l?t?|?
0$0,040<0D0L0T0\0d0l0t0|0
1$1,141<1D1L1T1\1d1l1t1|1
2$2,242<2D2L2T2\2d2l2t2|2
3$3,343<3D3L3T3\3d3l3t3|3
4$4,444<4D4L4T4\4`>h>p>x>
? ?(?0?8?@?H?P?X?`?h?p?x?
0 0(00080@0H0P0X0`0h0p0x0
1 1(10181@1H1P1X1`1h1p1x1
2 2(20282@2H2P2X2`2h2p2x2
3 3(30383@3H3P3X3`3h3p3x3
4 4(40484@4H4P4X4`4h4p4x4
5 5(50585@5H5P5X5`5h5p5x5z?~?
9$9,949<9D9L9T9\9d9l9t9|9
:4>8>T>X>x>
? ?@?`?
0 0@0`0
1(1H1h1
60646H6L6P6T6X6\6`6d6h6l6x6|6
ZX{a>*M
u%HDFx
{dmhS5
f)HG-z
2mEu9d
.VKtp!
!+['n*
{|ZWgU
W^o_oH
}~ZG0
5I27U7|
j7+W|u
i*Ez `08c
,`?<!y
'[)Ed\
e*yIJG
1/WpB0
Nfm@,)
'[)?d\
ixQVWJ
);T&X3
vLaw{,
,`n<!/
PQBHP1
n$2b9v7
pPMIB7
b;0/5h
dZbilll
J_/=9jgA_
QYWJ2x
ay0a;0
aZ=>iH
Q<k/sbmOy
L(iiK*
0[UaF#G
C#@nvOh\
DFR^9jW
e=V_`m
s%$2bM
7L.7v*
H6P`4
^b5@TJ
O~8Lh7
r,eUSL
]<zPQS0
~fA-W1
$ 7@t
e?7K=cuc
@hx,No
YW82Cm
"vxCN+m
{vT(ns
~4e^pc
oDnUWiv
WArIs[
~K#K1}o>
sUSJ{X
h.o24V
kQQS(T^YW8<M
6?g)#`
lA!L3&
cvgK<)[(5
llBWrpS
XIU;u2
*?@,ClyZ[
.&2Dwm
(P=j -
!"l\p#
utt!Cxl
D,wbiJ
66A}CV
>^)nzQ
Z=bJR
a=6W05
BY6g"=
Ua8,cj
Fp'^f7
lE[[?H3
~2{l'B
9V2WUd
F{i9j~^
[i[^!=s
C0Fg/<Z
D7';,<
@TJ(M#
VCHpPH
!569(=
`,1_<U[
%5@TVe&Xe
kz-7=9\6
V!epP6N
yJW?v:
S@<!iX
9P=9S#
\WJk{c
t'V<PZ
z-NW$c
SGHH58
haJ]H&
6wVe&z:
7@<{dP
11$qcWvV~
h')HA#
AaFeZY
t`;0W=
BYH_7x
x24=ywu
/h*+2z
A5M^TA
.Q0*.XC
YW82Cm
gCK1K5
4$T0^[
qwLW(?wP
07<%$^
AJoVo}
+wHxOQBV
AOoYWzx
uba$PQ
5](x"4
IXQ.Iz
t4OHyy
&kA]x27
gv.+mo
Ja[6iH
SzQFtS
5@Tp+`1
[9j$c=
x!>\VA
rgB5`.
"_`gHT
/8#8sE
os$2bM
]J4Feo[
$ ."\_
~HyT):
L2>Y]4!
VW20@s
-Xu+I
sb|Eej
|Y=QHVI
a~[|n.
l-Ndrs
W(6@P,
!#zrZm
9Jf&`-
{M9Ju?
IXm%"O
WK.HdU%7
Lr4<%p
&k=<jWb
v5fdc`
U&e%xM<
PtyRzM
&lPWD"
PEc5GJUE
Y6;$VA
Ap84rN
Ka1j`V
=K4^[h
+]-yJo{q
6Gj{%]
Ib~~rc
9NK?YU
S(5eu
0'O?AuAs[
i#_sGH6
lTUr_&
LP=9@W
gHXon(
/CxT]1
3azw]8
Y|<hc@
f5U7|X
+$2b9K
+$2b9K
j$2b9K
"=L>ti
Q)mW_v
8$2b9K
j$@0ok
<~w$2b9K
&RR,|-
"m4Uab(s
:yo;1s
guew wY%
+O;n)0?
x2Rl=F
+TU7|hs
}ygx5T
+TU7|hs
1W_,b+
%GKVh*
Z(o9br
Png)#{Y
yE9(i*
EJsKn=
m\O0Qs
K=c\$'4
,:Fp%Hb;
q_]$K:
#h#Ui\shV
tzBV.ob
i3OOtt/n
D?\w@1
cVA^wN
`4i3cg
d.|Uu5
0@/,&["
aTqg2+L
s?Sr9,
3'TQdNp
P=9jK`
Sm{hg?
#u-Zvs
<h7S'=
B){rA7I
2jz^?kB0
cYC!B`
NsL%F!
A0dc.,
^@/[!]
9wAQ)v
QD24Ow4Yk
L`Wm\G
=%N%Ar
TvcCf/ag
W@#UP\
FbzBS@}
mb=i\c
gh~XXek
#@zs25
D{6M"0
^A\yOc9
@ym9Z]
#q/")a
CydX0,
dD%$[f1
Ii+"Ox
,Q-:7y
S[B`+;N]
4@^#sQ
JiE*+0DCO
j;f1xF
F4N?o~g
9[K=8Q
PoebH/
Z h@Zp
rH38]E9
ME-sY2
T Hb2D
W;F*<'P%6C
G;5a88
E.F5/}t
wV9E!FA8"
vq4B/l0v
9(WR1`
v'eWN{=
b+vGq@
&< 58Q
Md5a!`l
ylJ4Uq
{&E';q
v@w*fa
LJ"\sfw
<%]J^2
b+OOQ-^c
R9MG%I
1GthmQU
%.U>kz
`,#_I|
U%M%|s
%TI8c6
Lz]~9u
>/T2xb
Vs`(j6b
.Fu?cJJM
5%uWBo
8NYeU(?_
E'XQY9
b]FMbB=
yO(T"h8
mI4PQ-Y0
&6*fvf/
m:/Gn`
>#G]!Q
hr#\[I
9~zj4t
+?XoT{
&eL#mE
)i_m^Z
1Tob,R
[c3#s
6R8=2
CwLY"_
rC&2hMp
G=MaeP
KqBFv:
{1:eGE
GLROOK
E+y(9k
M`<))$
@kmQMW
T6EY&P
3&&#e\/
>s`yg:
XRI3K+
N5zLv&5
%yW\[I}-
%~$K J
!T+'5AV)
@PX@2H%
\l;76H
08=p0
p@37Qua
*&E4hl
`2lKt(i
ilHf(be
rn{F{g
:v?y.K
CWxnc(3R
)LUaXSb
as}ZrN
|7{n[e
@&{t:3
&5["qc
a!wQxx
:Y]T]
cy^l3y
o?,^lV(i
<;daWQ
[:<jP2
Hj_NKW
zQ@R(G
c7L(U"
U%_e<}
)UEr7i
ga6>w0
/Iish
B!L)kb
6,h}l@
wS48+`
"uJmY9
c<O%KV
NO3.4}
oxsj`y
u]gy=i
`+Q+sA
]d_F:1%
l}QI.W
m9%lXa2
2E"^uY
<4k8]3
B'XE4s
{|`OW1d
`c-3Z%
qCQB6:
9% m`=
jOKHv@
lEvR3o
6S=~*r
M~Gx?U.
:^~m7^;-
(2iSny.
7Sq|hQu
l8)\rq^
{[$kq"
X%SI#6
Y=W WIq
*:gg%wh
)B$'yJ
=l}eg
>Iol&N
QGD,j
=IX(Fa{
ck"_rE
?V%z>,{
q_&.pw
;Ot 6T
ndqkbu
Du^L"z
@advapi32
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
mscoree.dll
@ja-JP
@api-ms-win-appmodel-runtime-l1-1-1
api-ms-win-core-datetime-l1-1-1
api-ms-win-core-file-l2-1-1
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-kernel32-package-current-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
user32
((((( H
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
CONOUT$
Button
Button
Button
Button
Button
Button
Button
Button
DialogClass
DialogClass
CGBOXCLASS
CGBOXCLASS
SAVEBOXCLASS
SAVEBOXCLASS
CLOUDY PEN: beta 0.0
button
button
button
button
button
button
Bmp File(*Bmp)
Antivirus Signature
Bkav W32.AIDetect.malware2
Lionic Trojan.Win32.Noon.l!c
Elastic Clean
MicroWorld-eScan Trojan.GenericKD.46727443
FireEye Generic.mg.059b1244ac9fda54
CAT-QuickHeal Clean
ALYac Generic.Cryptor.X.1735B54E
Cylance Unsafe
VIPRE Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Clean
BitDefender Trojan.GenericKD.46727443
K7GW Clean
CrowdStrike win/malicious_confidence_70% (W)
BitDefenderTheta Gen:NN.ZexaF.34050.wyZ@aqwvwKfi
Cyren Clean
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.HLXQ
Baidu Clean
APEX Malicious
Paloalto generic.ml
ClamAV Clean
Kaspersky HEUR:Trojan-Spy.Win32.Noon.gen
Alibaba TrojanSpy:Win32/FormBook.46f77094
NANO-Antivirus Clean
ViRobot Clean
Rising Trojan.Kryptik!1.D84E (CLASSIC)
Ad-Aware Trojan.GenericKD.46727443
Sophos Mal/Generic-S
Comodo Clean
F-Secure Clean
DrWeb Trojan.Packed2.43330
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Generic.fc
CMC Clean
Emsisoft Generic.Cryptor.X.1735B54E (B)
SentinelOne Static AI - Suspicious PE
GData Trojan.GenericKD.46727443
Jiangmin Clean
eGambit Unsafe.AI_Score_99%
Avira TR/Kryptik.sklls
MAX malware (ai score=80)
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Arcabit Generic.Cryptor.X.1735B54E
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/FormBook.SM!MTB
Cynet Malicious (score: 100)
AhnLab-V3 Malware/Win.Generic.C4575975
Acronis Clean
McAfee RDN/Generic PWS.y
TACHYON Clean
VBA32 BScope.Backdoor.Androm
Malwarebytes Trojan.Injector
Panda Trj/CI.A
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
Ikarus Clean
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/Kryptik.HLWX!tr
Webroot Clean
AVG Win32:MalwareX-gen [Trj]
Cybereason malicious.4ac9fd
Avast Win32:MalwareX-gen [Trj]
Qihoo-360 Win32/Ransom.Cryptor.HwoCueAA
No IRMA results available.