Static | ZeroBOX

PE Compile Time

2021-08-05 09:54:14

PDB Path

C:\xampp\htdocs\Loct\2c895ad54ef34e6a926d4879eeb8048f\Loader\pr2\Release\pr2.pdb

PE Imphash

7f3a4a0e96d9bcc5b3425ad3dca611da

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000120be 0x00012200 6.61059743505
.rdata 0x00014000 0x000078d6 0x00007a00 4.94449169663
.data 0x0001c000 0x00001900 0x00000e00 3.36009565795
.rsrc 0x0001e000 0x0006a040 0x0006a200 4.87247842781

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x00087740 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00087740 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00087740 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00087740 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00087740 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00087740 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00087740 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00087740 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00087740 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_MENU 0x00087c30 0x0000004a LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x00087c90 0x00000120 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x00087c90 0x00000120 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x00087e90 0x0000002c LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ACCELERATOR 0x00087c80 0x00000010 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x00087ba8 0x00000084 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x00087ec0 0x0000017d LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library KERNEL32.dll:
0x414008 WriteFile
0x41400c CloseHandle
0x414010 VirtualProtect
0x414014 DecodePointer
0x414018 GetConsoleMode
0x41401c GetConsoleOutputCP
0x414020 FlushFileBuffers
0x414024 HeapReAlloc
0x414028 HeapSize
0x41402c SetFilePointerEx
0x414030 GetProcessHeap
0x414034 LCMapStringW
0x414038 ReadFile
0x41403c GetStringTypeW
0x414040 SetStdHandle
0x41404c WideCharToMultiByte
0x414050 MultiByteToWideChar
0x414054 GetCommandLineW
0x414058 GetCommandLineA
0x41405c GetCPInfo
0x414060 GetOEMCP
0x414064 GetACP
0x414068 CreateFileW
0x414070 GetCurrentProcessId
0x414074 GetCurrentThreadId
0x41407c InitializeSListHead
0x414080 IsDebuggerPresent
0x41408c GetStartupInfoW
0x414094 GetModuleHandleW
0x414098 GetCurrentProcess
0x41409c TerminateProcess
0x4140a0 RaiseException
0x4140a4 RtlUnwind
0x4140a8 GetLastError
0x4140ac SetLastError
0x4140b0 EncodePointer
0x4140c4 TlsAlloc
0x4140c8 TlsGetValue
0x4140cc TlsSetValue
0x4140d0 TlsFree
0x4140d4 FreeLibrary
0x4140d8 GetProcAddress
0x4140dc LoadLibraryExW
0x4140e0 GetStdHandle
0x4140e4 GetModuleFileNameW
0x4140e8 ExitProcess
0x4140ec GetModuleHandleExW
0x4140f0 HeapFree
0x4140f4 HeapAlloc
0x4140f8 GetFileType
0x4140fc FindClose
0x414100 FindFirstFileExW
0x414104 FindNextFileW
0x414108 IsValidCodePage
0x41410c WriteConsoleW
Library USER32.dll:
0x414114 LoadCursorW
0x414118 GetWindowLongW
0x41411c MessageBeep
0x414120 MessageBoxW
0x414124 GetWindowTextW
0x414128 SetWindowTextW
0x41412c EndPaint
0x414130 BeginPaint
0x414134 GetDC
0x414138 UpdateWindow
0x41413c GrayStringW
0x414144 LoadAcceleratorsW
0x414148 LoadIconW
0x41414c GetDlgItem
0x414150 EndDialog
0x414154 DialogBoxParamW
0x414158 ShowWindow
0x41415c DestroyWindow
0x414160 CreateWindowExW
0x414164 RegisterClassExW
0x414168 PostQuitMessage
0x41416c DefWindowProcW
0x414170 SendMessageW
0x414174 DispatchMessageW
0x414178 TranslateMessage
0x41417c GetMessageW
0x414180 LoadStringW
0x414184 SendDlgItemMessageW
Library COMDLG32.dll:
0x414000 GetOpenFileNameW

!This program cannot be run in DOS mode.
`.rdata
@.data
||t7=c
QQSVWd
URPQQh
UQPXY]Y[
Tt)jhZf;
Jjl^f;
V2jx_f;
F2jgYf;
j"_f9y
u,PQRS
Wj0XPV
SPjdVQ
tlj*Yf
f9:t!V
QQSVj8j@
CY<u
PPPPPPPP
PPPPPWS
PP9E u:PPVWP
Unknown exception
bad array new length
string too long
vector too long
bad allocation
bad exception
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__swift_1
__swift_2
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
operator co_await
operator<=>
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
`anonymous namespace'
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
(null)
CorExitProcess
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
NAN(SNAN)
nan(snan)
NAN(IND)
nan(ind)
LCMapStringEx
LocaleNameToLCID
AppPolicyGetProcessTerminationMethod
[aOni*{
~ $s%r
@b;zO]
v2!L.2
1#QNAN
1#SNAN
?5Wg4p
%S#[k=
"B <1=
_hypot
_nextafter
C:\xampp\htdocs\Loct\2c895ad54ef34e6a926d4879eeb8048f\Loader\pr2\Release\pr2.pdb
.text$mn
.text$x
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$r
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.data$r
.data$rs
.rsrc$01
.rsrc$02
CreateFileW
ReadFile
WriteFile
CloseHandle
VirtualProtect
KERNEL32.dll
LoadStringW
GetMessageW
TranslateMessage
DispatchMessageW
SendMessageW
DefWindowProcW
PostQuitMessage
RegisterClassExW
CreateWindowExW
DestroyWindow
ShowWindow
DialogBoxParamW
EndDialog
GetDlgItem
SendDlgItemMessageW
LoadAcceleratorsW
TranslateAcceleratorW
GrayStringW
UpdateWindow
BeginPaint
EndPaint
SetWindowTextW
GetWindowTextW
MessageBoxW
MessageBeep
GetWindowLongW
LoadCursorW
LoadIconW
USER32.dll
GetOpenFileNameW
COMDLG32.dll
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RaiseException
RtlUnwind
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapFree
HeapAlloc
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
LCMapStringW
GetProcessHeap
SetFilePointerEx
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
DecodePointer
WriteConsoleW
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVbad_array_new_length@std@@
.?AVbad_alloc@std@@
.?AVexception@std@@
.PAVexception@std@@
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVbad_exception@std@@
.?AVtype_info@@
9!!![ggg
hhhyooo
iiix,,,
#]]]}[[[}
#]]]}[[[}
#]]]}[[[}
#]]]}[[[}
===ODDDC
AAAC===N
===ODDDC
AAAC===N
tnnnilll
444rrrr
KKK@RRRDRRRDRRRDRRRDRRRDRRRDRRRDRRRDRRRDRRRDRRRDRRRDRRRDRRRDRRRDRRRDRRRDRRRDRRRDRRRDOOODIIID
777`OOO
333*ggg
III=|||
III=|||
---nnn
___+jjjNiiiKiiiKiiiKhhhGfff
7775$$$
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
B0\qfz
RKNb5
y^TsMN
slc%#1
~AM`mO
jM&&ZS^
,Pyj|e
!P=ipv
9w aeN
cejL9D^C
8sI"2.
je|kU5
%X%,C)jE
6`sWPg(
A,EA]`T
,EA]`T
A,EA]`T
SN5A]`
#"bj4e
Oj<9U0g
dm9sPiy+
4UQA=
|}!7$z5
Kj9bff
#H-%-#
IlIpKA
Bk!-!9
<':>O-(Sf<0
O3c-G(@
B'y=!HK
h3f\q0
1j&,`
=X=$&D
E<7`\W
51C.h/
2!eS:O
5Sw9{7
<i2pK*
jH(XfP
[<m(KV
Chsvj4
TJD/$
AztcGx
Yx-",""
?Sx_jOA
*]qt*k
U. >N0
?nJIl
<_;5CT
s0|sytm
1Sx_;`?P
lzEf7^#
q`1jl
WhGx%O
A,`=qR
zFwU6g
,6TT`T
A]`!@~
?VKA,
arU/%1
r,E*36
K,\o>!
45=r\R
6XK@qm
kuBL6]
lbpK$HAD
H/zCq(
1D%v.6
/ `>"g
dbz|Uv
EJj'7u
0JvEA]
rgg-EW
H|eEAVs?g
o:B6+:
|{Q6vW
{$7Jqit
!~YF/zX.
E<Utr3
te[|6L
{3UZA+
a^+]CK
w-h\c
dn";:Q
~CHb]uT
Cjjo:Nl
tzt~@x
a847UQ
^1G,%&mj
p9JBNd
T@K!:Q
^/:@-X
u{[''m
sza]hx
ru06Z.h$
k;PF*|
WUhza-Ox
<ke/:6'X
S/:M'X
+B^s+3
xpPrT$
lxr]b6
*j&YERV
DA99
67bW-Z7
S)zCq(
'y=CB{B&
(Lj70$8
yS}%B:R}4[r
Cs/j/
y=o$Io
6zbJT%
d mIv
r*K`T?
1R:lxV
xJ}qvW
bX-[]g
`E=Fk8&
/nJI5r
YSR!},
ihwE2r4
o'<Q,<F
P+BED9EG
-}%Hh
>qv D
AcG-,Y
w1r3UN
+BEU6EG
yXN@BxC
[mCdMG
A,ER8r
j39E[;
.L6JEl
YEu$~X
HC3KYSgd
buEUvN
o'<Q,<
U=[|2L
Sg816w
*TJo866
Jqitde9
7*g0Sg
HKCLZ;,
e$$.^23v2{
2Cq| D
qMi2Am
|^=yWoD
!C<hKG
mJR:<I
$cKKH/x
A,EA]`T
,lA)`~
!eSl!#ai
9^W9xQ
Au_Aa?
2F@4q04
tAK_ta?
!%Ss!La~
!zSs!La-
Ss!#a2
An_IaT
tA^_2a
8,EA]`
+^a9uQK
U!eSv!
!US+!!ai
U!eSv!
+,&Au`
2,uA\`~
tA__Aa_
+,&A)`
,uA]`f
!`S !Oa
U!eSv!
!$S)!1a{
,EA]`f
(vKlYWb
GnrPeU
A,EA]`T
jA~7'B
_jsH:Ne^
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
A,EA]`T
g,b%Em
r<D|u
&&gPwR
kIoEL+
ym|<^e"
K9Ft:VpH'
|j%Ei
([6b<9
&_RG""
B6w'7|/
&/dZg1e
BYy@Q|
G!syRt=
k!nMc-
!zI*B"
Pp']Y*|
QSuyful
EngDP5
>W]9rd
xiyiU2
Eo<h=D
yw?Xx.
Q>CJ_l
5Qk`n$
sup`9p
442?H~
Cv1Qk
|6C u
4k4y1z
Ne-'Mhd
HekBTs
?v2DG;
=OBVX0
#p2N7vL[r
^%'!)l
ccY2?X
!QulP8J
^wcdWV
Q{NsKy
J<F'7g
Q]bztQ9
H6z~uM
#fd,U1
<E{S;
2E(#1a
n)y6|o)
\\{fz*
i>qond
!m1;neY
F]t;29
#qI4x-
noi}fH
MOtDF+;
~juO'X
YYso5]
h.0B9F_
z#v"8)'
GsLT`T
@Bw#d{`
FCTZ{C
I/I~`a
ZZENnYpU
HD4*hR
.gy\9:
e7'Kk
t/OWJ8
3A*8%gr
{S6[FNJ#
2KD;<Q
!pB-ef.O
^<#~gV
PPWB`6r|$~
].)aJE
EZ40O'
GB4_7"&
z#3Q|\n
>Ov +=K
lgc6d#
~i/]kf"
=]`iwC
C|&4?
` gHr8
b7c(y&
/,dG}`
;*d%,$
Q&#]lt
f?eKJ{s
iq'<ag
q85z0mh
(T.w\7
E$F-6,a
:T*O<Wu;1
/{]>`/V
]mo|T!c
+/Y4!O
rF][w-Xd
5/;1&_
Hw>!&'N
/cL{q?
=%]"\k
2$\>dk-X;
7>U68N
+E_wIA
D}XS)+O
hp2B01
msb>boL
Pcaqr~TP
UdWo?WT
Gq`KPI8
JC=8g@
P4BD*H
ou>% [\
hHJ.dY
MH`0?v
EnVQ^y
5<DK&o
0bITS&J
>3)j.j
O%L_dW^CT
i[x,d~
VTO&]n\
M-O0k2
.y20QD
9qqQidM
7$anJ0Z
r=T6qtq
Gj2%;&
)mWQVM8
@n-f{rug
](&k]j
$/WQ[W
fjqUKr4<
sN).j:
tZC^/9
r>V4oR
9z}~xj7
Myswg7Z
ot%\c(
uZEsS%5
){ aC.
J$oJjb~@
.`9kkr
- J\}Z
q.YJ_EPw
L `%.`
}{)C;~
~7nC|!
RZDI#}
:zo\f
BD<xx"&
k=_*3`
W)Q&zat#$
n@8+J<
Kvk1S_>
jU7*bo
&86:pV
q@zn<m)
Gii,<% ~
K|?]!;\
Bm8EL)
_)a;lb@{
,V_UOH`
~ET&ppm
.;Tf@mTL|
-i]Va]d
U-C@y|
es:}64l
)z}8:8
pV{:!q8
lAny~M
5w"P:+
9L2GnR1
q?Tqf@d#
1LEYwO
`CM_OQ
EdWmV8
=GiM'<
+s2!e
^q}^*7p=
',^Xi"
l!J.?0(FNl
4]U'RsM
~q}Gx8]
},cFr5
J0s%g)
\yiVRB
SBO&74:fF
G'fp1
&+&1="!5
FGvl^}
TBJ2v(
:O6;.z
Vm>j2"
P-qn%G'
8dezgF0X
ls;43C
:iBUqh
g68~#72
@ &I)2
Fx$MDNP
s8>`J2
-bU5H%
65I=W&/
>4wa0UA
t4!_x@x#\
!G1$88[3X
G=p2;K
nh5%Oy"
BNt.rZ
93ak3 f
_(W>zy
p1s6pB
p?Lk#h
V&Ilw/~
z{{U}
'z2q`*
W./[J0
jys,;s
SX&N0$
(\H5bC
ZD|[K!
De@e\3
m5WvSZT
^(q/4UE
~jU0Y:A
A5z*(i
+#5#qU
mFpBc*
"|R+KpQ+
U~]#(
|y:[`T^
kVn)k_
cm^gb&
!yNN<
~r)vES
!<YUyM
Pn{`}v
j)}RM<
YS?f&%
Ajjjjj
Binary
button
Choose File
BUTTON
Write to file
Read from file
Open File
File open error
Can't open file explorer
Aapi-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
api-ms-
(null)
mscoree.dll
((((( H
((((( H
(
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
Aja-JP
Aapi-ms-win-core-datetime-l1-1-1
api-ms-win-core-file-l1-2-2
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
advapi32
api-ms-win-appmodel-runtime-l1-1-2
user32
ext-ms-
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
CONOUT$
iE&xit
h&About ...
About pr2
MS Shell Dlg
pr2, Version 1.0
Copyright (c) 2021
Dialog
MS Shell Dlg
Cancel
Antivirus Signature
Bkav W32.AIDetect.malware2
Lionic Trojan.Win32.Stealer.i!c
Elastic Clean
DrWeb Trojan.Siggen14.55776
MicroWorld-eScan Clean
FireEye Generic.mg.7598c86263182dca
CAT-QuickHeal Clean
Qihoo-360 HEUR/QVM20.1.111F.Malware.Gen
ALYac Clean
Cylance Unsafe
VIPRE Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
Cybereason Clean
Arcabit Clean
BitDefenderTheta Gen:NN.ZexaF.34058.UqZ@ay2QrPji
Cyren Clean
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.HLYU
Zoner Clean
TrendMicro-HouseCall Clean
Paloalto generic.ml
ClamAV Clean
Kaspersky HEUR:Trojan-Spy.Win32.AveMaria.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Trojan.Kryptik!1.D84E (CLASSIC)
Ad-Aware Clean
Sophos Clean
Comodo Clean
F-Secure Clean
Baidu Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Emotet.bh
SentinelOne Static AI - Suspicious PE
CMC Clean
Emsisoft Clean
Ikarus Clean
Jiangmin Clean
Webroot Clean
Avira Clean
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Microsoft Trojan:Win32/Wacatac.B!ml
SUPERAntiSpyware Clean
ZoneAlarm Clean
GData Clean
Cynet Malicious (score: 100)
AhnLab-V3 Malware/Win.Cryptor.R435861
Acronis Clean
McAfee Artemis!7598C8626318
MAX Clean
VBA32 BScope.Trojan-Dropper.Injector
Malwarebytes Trojan.Injector
Panda Clean
APEX Malicious
Tencent Win32.Trojan.Inject.Auto
Yandex Clean
TACHYON Clean
eGambit Clean
Fortinet W32/GenKryptik.FILN!tr
AVG Win32:RATX-gen [Trj]
Avast Win32:RATX-gen [Trj]
CrowdStrike win/malicious_confidence_60% (W)
MaxSecure Trojan.Malware.300983.susgen
No IRMA results available.