Static | ZeroBOX

PE Compile Time

2021-03-21 11:16:15

PDB Path

C:\humerepe-52\zimo.pdb

PE Imphash

410705447b2186b51cd6d6e90a878e3a

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0001f02c 0x0001f200 7.54638408603
.rdata 0x00021000 0x0000442f 0x00004600 4.27537023579
.data 0x00026000 0x000e2a28 0x00002600 2.24519476774
.rsrc 0x00109000 0x0000fd28 0x0000fe00 6.29179988569

Resources

Name Offset Size Language Sub-language File type
FIBOLUWAWABUROBI 0x00116098 0x00000685 LANG_TSWANA SUBLANG_DEFAULT ASCII text, with very long lines, with no line terminators
RT_CURSOR 0x00118158 0x000000b0 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x00118158 0x000000b0 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x00118158 0x000000b0 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x00118158 0x000000b0 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x00118158 0x000000b0 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x00115bb8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00115bb8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00115bb8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00115bb8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00115bb8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00115bb8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00115bb8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00115bb8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00115bb8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00115bb8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00115bb8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00115bb8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00115bb8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00115bb8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00115bb8 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_STRING 0x00118750 0x000005d4 LANG_TSWANA SUBLANG_DEFAULT data
RT_STRING 0x00118750 0x000005d4 LANG_TSWANA SUBLANG_DEFAULT data
RT_STRING 0x00118750 0x000005d4 LANG_TSWANA SUBLANG_DEFAULT data
RT_ACCELERATOR 0x00116748 0x00000020 LANG_TSWANA SUBLANG_DEFAULT data
RT_ACCELERATOR 0x00116748 0x00000020 LANG_TSWANA SUBLANG_DEFAULT data
RT_GROUP_CURSOR 0x00118208 0x00000022 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x00118208 0x00000022 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x00118208 0x00000022 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x0010f7f8 0x00000068 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x0010f7f8 0x00000068 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x00118230 0x000001b4 LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library KERNEL32.dll:
0x421008 LoadResource
0x421010 ReadConsoleA
0x421014 GetCurrentProcess
0x421020 WaitForSingleObject
0x421028 QueryActCtxW
0x421030 VerifyVersionInfoA
0x421034 GetModuleFileNameW
0x421038 GetLocaleInfoA
0x42103c GetProcAddress
0x421048 ResetEvent
0x42104c OpenMutexA
0x421050 WriteConsoleA
0x421054 LocalAlloc
0x421058 SetConsoleOutputCP
0x42105c GlobalGetAtomNameW
0x421064 SetSystemTime
0x421068 GetModuleFileNameA
0x42106c GetModuleHandleA
0x421070 EraseTape
0x421074 FindFirstVolumeA
0x421078 GetCurrentProcessId
0x42107c AddConsoleAliasA
0x421084 ReleaseSemaphore
0x421088 GetCommandLineW
0x42108c GetLastError
0x421090 HeapReAlloc
0x421094 HeapAlloc
0x421098 GetStartupInfoW
0x42109c RaiseException
0x4210a0 RtlUnwind
0x4210a4 TerminateProcess
0x4210b0 IsDebuggerPresent
0x4210b4 HeapFree
0x4210b8 SetHandleCount
0x4210bc GetStdHandle
0x4210c0 GetFileType
0x4210c4 GetStartupInfoA
0x4210cc SetFilePointer
0x4210d0 GetModuleHandleW
0x4210d4 TlsGetValue
0x4210d8 TlsAlloc
0x4210dc TlsSetValue
0x4210e0 TlsFree
0x4210e4 SetLastError
0x4210e8 GetCurrentThreadId
0x4210f0 HeapCreate
0x4210f4 VirtualFree
0x4210f8 VirtualAlloc
0x4210fc CloseHandle
0x421100 Sleep
0x421104 ExitProcess
0x421108 WriteFile
0x421114 GetTickCount
0x42111c CreateFileA
0x421124 SetStdHandle
0x421128 GetCPInfo
0x42112c GetACP
0x421130 GetOEMCP
0x421134 IsValidCodePage
0x421138 WideCharToMultiByte
0x42113c GetConsoleCP
0x421140 GetConsoleMode
0x421144 FlushFileBuffers
0x421148 HeapSize
0x42114c LoadLibraryA
0x421150 SetEndOfFile
0x421154 GetProcessHeap
0x421158 MultiByteToWideChar
0x42115c ReadFile
0x421160 GetStringTypeA
0x421164 GetStringTypeW
0x421168 LCMapStringA
0x42116c LCMapStringW
0x421170 GetConsoleOutputCP
0x421174 WriteConsoleW
Library USER32.dll:
Library ADVAPI32.dll:
0x421000 CloseEventLog
Library WINHTTP.dll:
0x421184 WinHttpSetOption

Exports

Ordinal Address Name
1 0x401046 @SetFirstEverVice@8
2 0x40104f @SetViceVariants@12
!This program cannot be run in DOS mode.
`.rdata
@.data
WWWWWWW
0WWWWW
0WWWWW
jXhxDB
QQSVWd
0SSSSS
<at9<rt,<wt
URPQQh
tNIt?It0It
jTh EB
j@j ^V
>=Yt1j
QQSVWh
HtHu4j
s[S;7|G;w
tR99u2
tRHtCHt4Ht%HtFHHt
tGHt.Ht&
^SSSSS
8VVVVV
;t$,v-
UQPXY]Y[
0A@@Ju
0SSSSS
0SSSSS
0WWWWW
AAFFf;
_VVVVV
^WWWWW
v$;5$qB
PPPPPPPP
FVh4-B
PPPPPPPP
GWh4-B
t"SS9]
0SSSSS
_VVVVV
t+WWVPV
<+t(<-t$:
+t HHt
-[CO7Y'
xx?X|r
',m4y~
Mgdo@Z
aj]iQy
dQDh)QKL
`r;w)3c
vp?8fY
Q|5:6E
jhe_5&
FD.A&;
+HQu91]
dV4BDC
0,:%JvxX}
3C3?Vj
F@U}M0
7~0@gkh
H8UXh,
t\>1(e
C;/K'b
"%/pbv
CI(`s6j
o4bg"l5%C
\5H'Z8
|<T{1E
MR.NBA
H[etqOg
![lN8:%
&8,HAy
,) J6K
cjccDr3
467tE-
{y>{&kk
z~oF72
]M[,ks
kgSH'{
Ua_$`[
}p/<Et
.Zu!61&5
Pw\6`S
ES1Z|m1
!=R}
c,Hs!t
5*V@H-
&I;lU2$
YpZv}Sx
~N#b h
?}/>wG
3nZ,(P6rX
5%q00$b,
`43>ElJ
{[Y.w9
Lcjk6
4q<?,/
>`)Naz
*cT`@w
|SlB$(e?K"v
]#kN 3k
-?W83k
a,d~Jz
Zalh~C
L4_6N<
',zJsE
v$X(.$
8n?Y[1
B~wgkI
(\LGt
J&x&].
9^_V2c~
^I({Ew
f&HKOp
'2L+"l
$-$r!
$I!U.G
NYJ^?h
:vXqHL
2-@R}e
h8Dn~)-
<XW s
t/tv!9
a9R+VP
Ltd mq
QGISn3
hWM7_
\obI|"2i
y7Auh_
`9+PGW\
XE`8jX
4mpkN7-
GG,@'c
szq5ej=i
*I`s"Q
$i\8eo
5TGiuZ
g,24?u
+B18rEf
c="4!g
wHWLN'
bad allocation
string too long
invalid string position
Unknown exception
UTF-16LE
UNICODE
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
CorExitProcess
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
bad exception
_nextafter
_hypot
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
GAIsProcessorFeaturePresent
KERNEL32
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
CONOUT$
1#QNAN
1#SNAN
bad allocation
kixucigehorosaxuyumugavek
bihezinofoyudenosovamo gep misopimobutewafakiho vomexepocab masobetepilaxivapocenazedah
kernel32.dll
LocalAlloc
VirtualProtect
C:\humerepe-52\zimo.pdb
GetCommandLineW
GetLocaleInfoA
LoadResource
InterlockedIncrement
ReadConsoleA
GetCurrentProcess
GetSystemWindowsDirectoryW
GetEnvironmentStringsW
WaitForSingleObject
GetSystemDefaultLCID
QueryActCtxW
LeaveCriticalSection
VerifyVersionInfoA
GetModuleFileNameW
ReleaseSemaphore
GetProcAddress
EnterCriticalSection
DisableThreadLibraryCalls
ResetEvent
OpenMutexA
WriteConsoleA
LocalAlloc
SetConsoleOutputCP
GlobalGetAtomNameW
WaitForMultipleObjects
SetSystemTime
GetModuleFileNameA
GetModuleHandleA
EraseTape
FindFirstVolumeA
GetCurrentProcessId
AddConsoleAliasA
FindActCtxSectionStringW
KERNEL32.dll
RealChildWindowFromPoint
USER32.dll
CloseEventLog
ADVAPI32.dll
WinHttpSetOption
WINHTTP.dll
GetLastError
HeapReAlloc
HeapAlloc
GetStartupInfoW
RaiseException
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
SetFilePointer
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
VirtualAlloc
CloseHandle
ExitProcess
WriteFile
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
CreateFileA
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
LoadLibraryA
SetEndOfFile
GetProcessHeap
MultiByteToWideChar
ReadFile
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetConsoleOutputCP
WriteConsoleW
surape.exe
@SetFirstEverVice@8
@SetViceVariants@12
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVout_of_range@std@@
.?AVtype_info@@
.?AVbad_exception@std@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVexception@std@@
.?AVbad_alloc@std@@
X&'_cK
9.cYl-Y
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
w\>b{<<<<s
<<<<<<
O<<<<<<<
<<<<<<<
<<<<<<<<
<<<<<<<<<<
<<<<<<<<
qNXz:B\
"CdtV8
_________________________________________________________________________________________________
8a_________________
i________________
!_______________
i_______________
i_______________
S0di_______________
i_______________
di_______________
i_______________
Pdi_______________
i_______________
l!_______________
``$9%3..{.Z
!_______________8F3+
!_______________
!_______________8
!_______________8?
!_______________89
________________8
________________
________________
________________
d________________
________________
E,e________________
________________
d________________
________________
________________f1
777nTM
________________
nnMMMkU
________________
f________________e
________________e9
________________
________________
________________f}
________________
________________f
________________e
Zl_________________e5
_________________d
__________________!!eQ
____________________!!!iaiiiii
___________________________________________________________________________________________________________________________________________________________________
,4)3hks
ITD3grl~
Giluhipekiyac bobajutux. Dikahimehinapul. Velodumipoco. Cepubahutixok. Yiroj cihuciwocaxif vorib. Nosewusarepal hisimezec wuw namubilaxajokub xevowehat. Dedamacubumez rub vera zayutakecihi hurone. Xilocecalo liyezetula kuwocorayarid xesati vafefexa. Jisapecote xiko xeno. Veh. Citakecutanerag fipo. Wodo yuyigi zijinu jepuhusoyosesis vim. Gelazo xowugohizito. Bucaneyelowiseb hun. Vafesilo voxuzeriyosono gehasup. Gezosahuje maroroji pajoxemewafoj cufas nawar. Hisuxogu givimiwah. Xudirazoraw nexapawizusik sisi wemerehimawewik. Pojufi fugederu mija kuzolizumabu. Fidiloraloh numiborun guguje zuxax kapamemahuw. Corubuxufibit gazijigojajume zinihekekisasok nuf. Javimufayaki cayukid. Magudazegugen yeniloboxihebib zolod kitaweyixoha donexal. Betubemukacewo zuwuvegiger rososi. Vadal vizotocime. Davejafocapu lufasuk woc. Tafuyo xejosiconoruyi. Wabubesaxajolar josidokono vekej. Dorivivaf wupoxosetato cupidawujejar ludezemedujo pulaz. Rug dog hape tidoxiyekihake yerixikukikomiw. Jonokek nupitavimusi. Curiwon kesedofireh pe
iiiiii
iiiiii
iiiiiiiiiiii
iiiiiiiiii
iiiiii
iiiiiiiii
iiiiiiiiiiiii
iiiiiiii

KERNEL32.DLL
mscoree.dll
((((( H
h(((( H
H
hjehewerevahe kudumopuretizexexelizo ciruzapab rukusezulamamehoxe
wujuyaxofiwegiyisebeze
FIBOLUWAWABUROBI
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
VS_VERSION_INFO
StringFileInform
020284c6
InternalName
sojbmoeminu.ihe
Copyright
Copyrighz (C) 2021, fudkagata
ProductVersion
8.19.590.38
VarFileInfo
Translation
(Fumulofiroviyew jotonediyovez donoranisu
Yukud lufoyof beniwedi7Zimeka linoner cog renixipipuxudoh rafidete suboverujah
Luke giporage
Codim rotoKBaduyo jayilo damegidale mabahuwarubuhoh natuwefixisavo xuge pamizoleye fozTuy vihukicodagatuz turilafaweb
4Gogoyowumazosa nohizerazixi sizokixu muy piguhivujejLNonatako soyuzutiho cula xiyililonukuti jefo wum tecezo pujex giduzoculuvuve
Pigufupexivomav hafugajuxifo
?Xajalomilo sobuzonow zupucokozikupe xayawusutax zekic jenivujavNZegigopa faviwiwojoba fupicawepej giwuc fovimakumajal fokeye sow rebixamuxavotxVogomumuvurabob home vobi bapisikucajice bagadadohavusap kegegoxenikawot tonusixo sevupeyojut vaxolurejud bimugeyuharabu
Dudadujetiyonu veguEMeta vevijiyu vis celupeham someporudohehez bimesip nivus hopi semafuEKonir pevoj kix kodawavofow yorehogetiha woxol mofevul bugupehijofixi
_Gukejonevanin vimixoje vazolul sihifoyi topozev hocizixufiye wuyolowe gutagesaletule panoxa wet
Cimasexutojo hebotamijGPapu zowuve gafavuzis jul dugelawiyiciyad jokikiyuvipepu zevoramo rukojNYidi suherazo letoheto yobiyunidusu jagosabudu segehor jehimuvure facowaxasuke.Tarolazusuja fexad jatos vay tij xase giyokoti
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.Malicious.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Fragtor.21524
FireEye Generic.mg.e50df54836bd38c8
CAT-QuickHeal Clean
ALYac Gen:Variant.Fragtor.21524
Cylance Unsafe
Zillya Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Riskware ( 0040eff71 )
BitDefender Gen:Variant.Fragtor.21524
K7GW Riskware ( 0040eff71 )
CrowdStrike win/malicious_confidence_100% (W)
Baidu Clean
Cyren W32/Kryptik.EWJ.gen!Eldorado
Symantec Packed.Generic.525
ESET-NOD32 Win32/PSW.Fareit.L
APEX Malicious
Paloalto generic.ml
ClamAV Win.Packed.Generic-9894219-0
Kaspersky HEUR:Backdoor.Win32.Androm.gen
Alibaba Backdoor:Win32/Azorult.4cf27a05
NANO-Antivirus Clean
ViRobot Clean
Rising Trojan.Kryptik!1.D977 (CLASSIC)
Ad-Aware Gen:Variant.Fragtor.21524
TACHYON Clean
Emsisoft Trojan.Crypt (A)
Comodo Malware@#22z26p1dd6w1k
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Generic.dh
CMC Clean
Sophos Mal/Generic-S + Troj/Krypt-BO
Ikarus Trojan.Win32.Krypt
GData Gen:Variant.Fragtor.21524
Jiangmin Clean
Webroot W32.Trojan.Gen
Avira TR/AD.LokiBot.rfwau
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Ransom.Win32.STOP.ko!se42434
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Backdoor.Win32.Androm.gen
Microsoft Trojan:Win32/Azorult.RW!MTB
Cynet Malicious (score: 100)
AhnLab-V3 CoinMiner/Win.Glupteba.R441722
Acronis suspicious
McAfee Packed-GDV!E50DF54836BD
MAX malware (ai score=100)
VBA32 BScope.Trojan.Eb
Malwarebytes Trojan.MalPack.GS
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall TROJ_FRS.VSNW11I21
Tencent Win32.Backdoor.Fareit.Auto
Yandex Clean
SentinelOne Static AI - Malicious PE
eGambit Clean
Fortinet W32/GenKryptik.FKSO!tr
BitDefenderTheta Gen:NN.ZexaF.34142.nq0@auImkkkO
AVG Win32:MalwareX-gen [Trj]
Cybereason malicious.ff8824
Avast Win32:MalwareX-gen [Trj]
MaxSecure Trojan.Malware.300983.susgen
No IRMA results available.