Static | ZeroBOX

PE Compile Time

2021-09-04 03:53:47

PE Imphash

4bf525a95c960651ee1903cac916a093

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0002862a 0x00028800 6.50840751303
.rdata 0x0002a000 0x00010216 0x00010400 5.39387177554
.data 0x0003b000 0x000023c0 0x00001200 3.18494403447
.gfids 0x0003e000 0x000002c0 0x00000400 2.86703770876
.tls 0x0003f000 0x00000009 0x00000200 0.0203931352361
.rsrc 0x00040000 0x000001e0 0x00000200 4.69759700825

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x00040060 0x0000017d LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library KERNEL32.dll:
0x42a044 lstrcatW
0x42a048 GetFileAttributesW
0x42a04c CreateFileMappingW
0x42a050 MapViewOfFile
0x42a054 LoadLibraryA
0x42a058 UnmapViewOfFile
0x42a05c TerminateProcess
0x42a060 GetCurrentProcess
0x42a068 CreateProcessW
0x42a06c SetErrorMode
0x42a074 ExitProcess
0x42a07c Process32FirstW
0x42a080 Process32NextW
0x42a084 GetProcAddress
0x42a088 GetModuleHandleW
0x42a08c lstrcmpiA
0x42a090 IsWow64Process
0x42a098 Thread32First
0x42a09c Thread32Next
0x42a0a0 GetExitCodeProcess
0x42a0a4 WideCharToMultiByte
0x42a0a8 MultiByteToWideChar
0x42a0ac LocalAlloc
0x42a0b0 LocalFree
0x42a0b4 lstrcpyW
0x42a0b8 VirtualQuery
0x42a0bc Module32FirstW
0x42a0c0 ReadConsoleW
0x42a0c4 WriteConsoleW
0x42a0c8 SetStdHandle
0x42a0d4 GetCommandLineW
0x42a0d8 GetCommandLineA
0x42a0dc GetOEMCP
0x42a0e0 WaitForSingleObject
0x42a0e4 GetLastError
0x42a0e8 SetEndOfFile
0x42a0ec ReadFile
0x42a0f0 GetModuleFileNameW
0x42a0f4 VirtualAlloc
0x42a0f8 DeleteFileW
0x42a100 WriteFile
0x42a104 CreateFileW
0x42a108 CloseHandle
0x42a10c FindNextFileW
0x42a110 lstrcmpiW
0x42a114 Sleep
0x42a118 IsValidCodePage
0x42a11c FindFirstFileExW
0x42a120 FindClose
0x42a124 GetProcessHeap
0x42a128 GetCurrentProcessId
0x42a12c HeapSize
0x42a130 EnumSystemLocalesW
0x42a138 GetCurrentThread
0x42a13c GetCurrentThreadId
0x42a150 SetLastError
0x42a158 CreateEventW
0x42a15c TlsAlloc
0x42a160 TlsGetValue
0x42a164 TlsSetValue
0x42a168 TlsFree
0x42a170 EncodePointer
0x42a174 DecodePointer
0x42a178 CompareStringW
0x42a17c LCMapStringW
0x42a180 GetLocaleInfoW
0x42a184 GetStringTypeW
0x42a188 GetCPInfo
0x42a18c SetEvent
0x42a190 ResetEvent
0x42a19c IsDebuggerPresent
0x42a1a0 GetStartupInfoW
0x42a1a4 InitializeSListHead
0x42a1a8 GetThreadTimes
0x42a1ac FreeLibrary
0x42a1b0 LoadLibraryExW
0x42a1b4 RaiseException
0x42a1b8 RtlUnwind
0x42a1bc GetModuleHandleExW
0x42a1c0 HeapAlloc
0x42a1c4 HeapFree
0x42a1c8 HeapReAlloc
0x42a1cc GetStdHandle
0x42a1d0 GetACP
0x42a1d4 GetFileType
0x42a1d8 FlushFileBuffers
0x42a1dc GetConsoleCP
0x42a1e0 GetConsoleMode
0x42a1e4 SetFilePointerEx
0x42a1e8 IsValidLocale
0x42a1ec GetUserDefaultLCID
Library ADVAPI32.dll:
0x42a000 SetEntriesInAclW
0x42a004 RegCloseKey
0x42a008 SetFileSecurityW
0x42a00c GetFileSecurityW
0x42a01c RegOpenKeyExW
0x42a02c RegEnumValueW
0x42a030 RegQueryInfoKeyW
0x42a034 RegDeleteValueW
Library PSAPI.DLL:
0x42a1f8 EnumProcessModules
Library WINTRUST.dll:
0x42a200 WinVerifyTrust
Library IPHLPAPI.DLL:
0x42a03c GetExtendedTcpTable

!This program cannot be run in DOS mode.
Richa`
`.rdata
@.data
.gfids
9E$WWV
t,WW9}
jA[jZZ+
QQSVWd
URPQQh IA
;t$,v-
UQPXY]Y[
PPPPPPPP
j"^f91j\^u8
j"^f9q
t/j=[f;
tyPVj@W
_tcPVj@
u#j,Xf;
u0jAXf;
u0jAXf;
u%j\XPS
jPXjAf
t'j\Xf
PVSQSWV
PPPPPWS
PP9E u:PPVWP
SVWjA_jZ+
uBjAYjZ+
taj*Xf
VWj\^j:
WWWPWS
SSVWh
f9:t!V
}VWj=S
tl9tX
QQSWj0j@
<0|o<9
u^9^\t/
VX9^`tT
;N\u\W
u2Vj@h
9C`u99C\t4
9C`u5Wj
mSjA[jZ^+
8jZZf;
VjSXjyf
XjtYjef
f99u9S3
:u&f9y
D8(HXt:f
D8(Ht5F
SVjA[jZ^+
jAZjZ^
PPPPPPPP
bad allocation
invalid argument
invalid seek
io error
is a directory
message size
network down
network reset
network unreachable
no buffer space
no child process
no link
no lock available
no message available
no message
no protocol option
no space on device
no stream resources
no such device or address
no such device
no such file or directory
no such process
not a directory
not a socket
not a stream
not connected
not enough memory
not supported
operation canceled
operation in progress
operation not permitted
operation not supported
operation would block
owner dead
permission denied
protocol error
protocol not supported
read only file system
resource deadlock would occur
resource unavailable try again
result out of range
state not recoverable
stream timeout
text file busy
timed out
too many files open in system
too many files open
too many links
too many symbolic link levels
value too large
wrong protocol type
address family not supported
address in use
address not available
already connected
argument list too long
argument out of domain
bad address
bad file descriptor
bad message
broken pipe
connection aborted
connection already in progress
connection refused
connection reset
cross device link
destination address required
device or resource busy
directory not empty
executable format error
file exists
file too large
filename too long
function not supported
host unreachable
identifier removed
illegal byte sequence
inappropriate io control operation
interrupted
unknown error
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
InitOnceExecuteOnce
CreateEventExW
CreateSemaphoreW
CreateSemaphoreExW
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
FlushProcessWriteBuffers
FreeLibraryWhenCallbackReturns
GetCurrentProcessorNumber
CreateSymbolicLinkW
GetCurrentPackageId
GetTickCount64
GetFileInformationByHandleEx
SetFileInformationByHandle
GetSystemTimePreciseAsFileTime
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
InitializeSRWLock
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
SleepConditionVariableSRW
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
CompareStringEx
GetLocaleInfoEx
LCMapStringEx
0123456789abcdefghijklmnopqrstuvwxyz
0123456789abcdefghijklmnopqrstuvwxyz
bad array new length
SchedulerKind
MaxConcurrency
MinConcurrency
TargetOversubscriptionFactor
LocalContextCacheSize
ContextStackSize
ContextPriority
SchedulingProtocol
DynamicProgressFeedback
WinRTInitialization
MaxPolicyElementKey
bad exception
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
CorExitProcess
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
EnumSystemLocalesEx
GetUserDefaultLocaleName
IsValidLocaleName
LCIDToLocaleName
LocaleNameToLCID
_hypot
_nextafter
]vQ<)8
|)P!?Ua0
Eb2]A=
u?^p?o4
y1~?|"
?x+s7
?5Od%
?|I7Z#
>,'1D=
?g)([|X>=
~U`?K
:h"?bC
@H#?43
Ax#?uN}*
r7Yr7=
F0$?3=1
H`$?h|
&?~YK|
sU0&?W
<8bunz8
?#%X.y
F||<##
<@En[vP
<8bunz8
l,kg<i
<@En[vP
?5Wg4p
%S#[k=
"B <1=
___mblock__perst__
Killing processes
LockFile is null!
Locked persistence.
Removing lock. Process restoration is enabled again.
crypt32.dll
___mblock__perst__
No lock detected
Mutant object for locking is not there
Lock is enabled!
injection not running. terminating and rebooting
user is idling, injection is not in idle mode. rebooting
user is no more idling, injection is in idle mode. rebooting
NtQueryInformationProcess
224.0.0.0
Mozilla/4.0 (compatible; Windows NT 6.1; WOW64; Trident/6.0; .NET4.0C; .NET4.0E; .NET CLR 3.5.30729)
Mozilla/4.0 (compatible; Windows NT 6.1; WOW64; Trident/6.0; .NET4.0C; .NET4.0E; .NET CLR 3.5.30729)
--nicehash
-B --no-color --donate-level=1 -a RandomX -o %s -u %s -p %s -k -R --variant=-1
Process Created
Cant allocate in memory !
Now we are writing the miner into the allocated remote buffer
Context set
Now we are resuming the process !
Resumed process
SeDebugPrivilege
SeSecurityPrivilege
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
invalid string position
string too long
vector<T> too long
bad locale name
bad cast
ios_base::badbit set
ios_base::failbit set
generic
iostream
iostream stream error
ios_base::eofbit set
Unknown exception
.text$di
.text$mn
.text$x
.text$yd
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCC
.CRT$XCL
.CRT$XCU
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XLA
.CRT$XLZ
.CRT$XPA
.CRT$XPB
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$T
.rdata$r
.rdata$sxdata
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.data$r
.gfids$x
.gfids$y
.tls$ZZZ
.rsrc$01
.rsrc$02
GetCurrentProcessId
lstrcmpiW
FindNextFileW
CloseHandle
CreateFileW
WriteFile
GetFileAttributesExW
DeleteFileW
VirtualAlloc
GetModuleFileNameW
ReadFile
SetEndOfFile
GetLastError
WaitForSingleObject
GetEnvironmentVariableW
lstrcatW
GetFileAttributesW
CreateFileMappingW
MapViewOfFile
LoadLibraryA
UnmapViewOfFile
TerminateProcess
GetCurrentProcess
SetEnvironmentVariableW
CreateProcessW
SetErrorMode
SetUnhandledExceptionFilter
ExitProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetProcAddress
GetModuleHandleW
lstrcmpiA
IsWow64Process
Thread32First
Thread32Next
GetExitCodeProcess
WideCharToMultiByte
MultiByteToWideChar
LocalAlloc
LocalFree
lstrcpyW
VirtualQuery
Module32FirstW
KERNEL32.dll
RegOpenKeyExW
RegCloseKey
RegDeleteValueW
RegQueryInfoKeyW
RegEnumValueW
GetKernelObjectSecurity
GetSecurityDescriptorDacl
GetExplicitEntriesFromAclW
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetKernelObjectSecurity
GetFileSecurityW
SetFileSecurityW
ADVAPI32.dll
EnumProcessModules
GetModuleFileNameExW
PSAPI.DLL
WinVerifyTrust
WINTRUST.dll
GetExtendedTcpTable
IPHLPAPI.DLL
WaitForSingleObjectEx
GetCurrentThread
GetCurrentThreadId
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
UnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
GetThreadTimes
FreeLibrary
LoadLibraryExW
RaiseException
RtlUnwind
GetModuleHandleExW
HeapAlloc
HeapFree
HeapReAlloc
GetStdHandle
GetACP
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
FindClose
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
WriteConsoleW
ReadConsoleW
HeapSize
Copyright (c) by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVbad_alloc@std@@
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVout_of_range@std@@
.?AV_Locimp@locale@std@@
.?AVtype_info@@
.?AVbad_array_new_length@std@@
.?AVbad_exception@std@@
.?AV_Ref_count_base@std@@
.?AV?$_Ref_count_obj_alloc@V__ExceptionPtr@@U?$_StaticAllocator@H@@@std@@
.?AV?$_Ref_count_obj@V__ExceptionPtr@@@std@@
.?AV?$codecvt@DDU_Mbstatet@@@std@@
.?AV?$basic_ofstream@DU?$char_traits@D@std@@@std@@
.?AV?$basic_filebuf@DU?$char_traits@D@std@@@std@@
.?AV?$basic_ostream@DU?$char_traits@D@std@@@std@@
.?AV?$basic_streambuf@DU?$char_traits@D@std@@@std@@
.?AV?$basic_ios@DU?$char_traits@D@std@@@std@@
.?AV?$ctype@D@std@@
.?AUctype_base@std@@
.?AVbad_cast@std@@
.?AV_Iostream_error_category@std@@
.?AV_Generic_error_category@std@@
.?AVerror_category@std@@
.?AVfailure@ios_base@std@@
.?AVsystem_error@std@@
.?AV_System_error@std@@
.?AVruntime_error@std@@
.?AVexception@std@@
.?AVcodecvt_base@std@@
.?AVfacet@locale@std@@
.?AU_Crt_new_delete@std@@
.?AV_Facet_base@std@@
.?AVios_base@std@@
.?AV?$_Iosb@H@std@@
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
jjjjjjj
kernel32.dll
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
Badvapi32
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
COMSPEC
cmd.exe
((((( H
(
((((( H
mscoree.dll
BLC_ALL
LC_COLLATE
LC_CTYPE
LC_MONETARY
LC_NUMERIC
LC_TIME
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
Bapi-ms-win-appmodel-runtime-l1-1-1
api-ms-win-core-datetime-l1-1-1
api-ms-win-core-file-l2-1-1
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-kernel32-package-current-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
user32
UTF-16LEUNICODE
Bamerican
american english
american-english
australian
belgian
canadian
chinese
chinese-hongkong
chinese-simplified
chinese-singapore
chinese-traditional
dutch-belgian
english-american
english-aus
english-belize
english-can
english-caribbean
english-ire
english-jamaica
english-nz
english-south africa
english-trinidad y tobago
english-uk
english-us
english-usa
french-belgian
french-canadian
french-luxembourg
french-swiss
german-austrian
german-lichtenstein
german-luxembourg
german-swiss
irish-english
italian-swiss
norwegian
norwegian-bokmal
norwegian-nynorsk
portuguese-brazilian
spanish-argentina
spanish-bolivia
spanish-chile
spanish-colombia
spanish-costa rica
spanish-dominican republic
spanish-ecuador
spanish-el salvador
spanish-guatemala
spanish-honduras
spanish-mexican
spanish-modern
spanish-nicaragua
spanish-panama
spanish-paraguay
spanish-peru
spanish-puerto rico
spanish-uruguay
spanish-venezuela
swedish-finland
america
britain
england
great britain
holland
hong-kong
new-zealand
pr china
pr-china
puerto-rico
slovak
south africa
south korea
south-africa
south-korea
trinidad & tobago
united-kingdom
united-states
CONOUT$
Process Explorer
Process Hacker
Task-Manager
Process Monitor
Task Manager
%ls\%ls
:Zone.Identifier
Unity3D.exe
\Unity3D.exe
\Unity3D.exe
Software\IonAgent
AgentPath
/end /tn %ls
/Delete /TN %s /F
schtasks.exe
schtasks.exe
\Unity3D.exe
Software\IonAgent
Software\Microsoft\Windows\CurrentVersion\Run
Software\IonAgent
AgentPath
Software\IonAgent
Software\IonAgent
AgentPath
rundll32.exe shell32.dll,ShellExec_RunDLL "%ls"
Software\Microsoft\Windows\CurrentVersion\Run
\Unity3D.exe
schtasks.exe
/SC MINUTE /Create /TN %ls /tr "%ls #%ls,%ls"
/Delete /TN %ls /F
schtasks.exe
l\Unity3D.exe
Unity3D.exe
/Run /tn %ls
schtasks.exe
_ionreboot
active
_ionreboot
taskkill /PID
\Windows\
Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
Software\Microsoft\Windows\CurrentVersion\RunServices
Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\RunOnce
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
AppData
Program
APPDATA
PROGRAM
appdata
program
ntdll.dll
donation
stratum-tcp
donate-level
stratum+tcp
keepalive
cpu-priority
cpu-affinity
max-cpu-usage
worker-id
donate-level
%userprofile%\flop.exe
%userprofile%\flop.exe
%ls:Zone.Identifier
sEveryone
%windir%\system32\
%ls %ls
Everyone
Antivirus Signature
Bkav Clean
Lionic Clean
Elastic Clean
MicroWorld-eScan Clean
FireEye Generic.mg.ab554a6a408e86cc
CAT-QuickHeal Clean
ALYac Clean
Cylance Unsafe
VIPRE Clean
Sangfor Clean
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
CrowdStrike Clean
BitDefenderTheta Gen:NN.ZexaF.34126.oyW@amJOujji
Cyren Clean
ESET-NOD32 Clean
Baidu Clean
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky Clean
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Avast Clean
Rising Trojan.Generic@ML.81 (RDML:o96BRdaIcIgdtg31oSblTQ)
Ad-Aware Clean
Sophos Clean
Comodo Clean
F-Secure Clean
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Generic.dh
CMC Clean
Emsisoft Clean
SentinelOne Static AI - Malicious PE
GData Clean
Jiangmin Clean
Webroot Clean
Avira Clean
MAX Clean
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Clean
Cynet Malicious (score: 100)
AhnLab-V3 Clean
Acronis Clean
McAfee Clean
TACHYON Clean
VBA32 Clean
Malwarebytes Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
Ikarus Clean
MaxSecure Clean
Fortinet Clean
Panda Clean
No IRMA results available.