Static | ZeroBOX

PE Compile Time

1992-06-20 07:22:17

PE Imphash

a02ab1a937fc1433a9abad7bc2badee6

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
CODE 0x00001000 0x00019b2c 0x00019c00 6.50731456365
DATA 0x0001b000 0x000013b4 0x00001400 4.97947067573
BSS 0x0001d000 0x000009e1 0x00000000 0.0
.idata 0x0001e000 0x00000e26 0x00001000 4.50831203546
.edata 0x0001f000 0x0000004f 0x00000200 0.773320811097
.reloc 0x00020000 0x00001de4 0x00001e00 6.66947776901
.rsrc 0x00022000 0x00001400 0x00001400 3.65894196286

Resources

Name Offset Size Language Sub-language File type
RT_STRING 0x00022fa0 0x000002a0 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_STRING 0x00022fa0 0x000002a0 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_STRING 0x00022fa0 0x000002a0 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_STRING 0x00022fa0 0x000002a0 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_STRING 0x00022fa0 0x000002a0 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_STRING 0x00022fa0 0x000002a0 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_STRING 0x00022fa0 0x000002a0 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_RCDATA 0x00023250 0x0000018c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_RCDATA 0x00023250 0x0000018c LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library kernel32.dll:
0x41e114 VirtualFree
0x41e118 VirtualAlloc
0x41e11c LocalFree
0x41e120 LocalAlloc
0x41e124 GetVersion
0x41e128 GetCurrentThreadId
0x41e134 VirtualQuery
0x41e138 WideCharToMultiByte
0x41e13c MultiByteToWideChar
0x41e140 lstrlenA
0x41e144 lstrcpynA
0x41e148 LoadLibraryExA
0x41e14c GetThreadLocale
0x41e150 GetStartupInfoA
0x41e154 GetProcAddress
0x41e158 GetModuleHandleA
0x41e15c GetModuleFileNameA
0x41e160 GetLocaleInfoA
0x41e164 GetLastError
0x41e168 GetCommandLineA
0x41e16c FreeLibrary
0x41e170 FindFirstFileA
0x41e174 FindClose
0x41e178 ExitProcess
0x41e17c WriteFile
0x41e184 SetFilePointer
0x41e188 SetEndOfFile
0x41e18c RtlUnwind
0x41e190 ReadFile
0x41e194 RaiseException
0x41e198 GetStdHandle
0x41e19c GetFileSize
0x41e1a0 GetFileType
0x41e1a4 CreateFileA
0x41e1a8 CloseHandle
Library user32.dll:
0x41e1b0 GetKeyboardType
0x41e1b4 LoadStringA
0x41e1b8 MessageBoxA
0x41e1bc CharNextA
Library advapi32.dll:
0x41e1c4 RegQueryValueExA
0x41e1c8 RegOpenKeyExA
0x41e1cc RegCloseKey
Library oleaut32.dll:
0x41e1d4 SysFreeString
0x41e1d8 SysReAllocStringLen
0x41e1dc SysAllocStringLen
Library kernel32.dll:
0x41e1e4 TlsSetValue
0x41e1e8 TlsGetValue
0x41e1ec TlsFree
0x41e1f0 TlsAlloc
0x41e1f4 LocalFree
0x41e1f8 LocalAlloc
Library advapi32.dll:
0x41e200 RegQueryValueExA
0x41e204 RegQueryInfoKeyA
0x41e208 RegOpenKeyExA
0x41e20c RegOpenKeyA
0x41e210 RegFlushKey
0x41e214 RegEnumValueA
0x41e218 RegEnumKeyA
0x41e21c RegEnumKeyExA
0x41e220 RegCreateKeyExA
0x41e224 RegCloseKey
0x41e228 OpenThreadToken
0x41e22c OpenProcessToken
0x41e230 IsValidSid
0x41e234 GetTokenInformation
0x41e23c GetSidSubAuthority
Library kernel32.dll:
0x41e248 WriteFile
0x41e24c WideCharToMultiByte
0x41e250 WaitForSingleObject
0x41e254 VirtualQuery
0x41e258 SetLastError
0x41e25c SetFilePointer
0x41e260 SetEvent
0x41e264 SetEndOfFile
0x41e268 ResetEvent
0x41e26c ReadFile
0x41e270 OpenProcess
0x41e274 LocalFree
0x41e278 LoadLibraryA
0x41e284 HeapFree
0x41e288 HeapAlloc
0x41e28c GetVersionExA
0x41e290 GetThreadLocale
0x41e294 GetStringTypeExA
0x41e298 GetStdHandle
0x41e29c GetProcessHeap
0x41e2a0 GetProcAddress
0x41e2a4 GetModuleHandleA
0x41e2a8 GetModuleFileNameA
0x41e2ac GetLocaleInfoA
0x41e2b0 GetLocalTime
0x41e2b4 GetLastError
0x41e2b8 GetFullPathNameA
0x41e2bc GetDiskFreeSpaceA
0x41e2c0 GetDateFormatA
0x41e2c4 GetCurrentThreadId
0x41e2c8 GetCurrentThread
0x41e2cc GetCurrentProcess
0x41e2d0 GetCPInfo
0x41e2d4 GetACP
0x41e2d8 FormatMessageA
0x41e2dc FindFirstFileA
0x41e2e0 FindClose
0x41e2ec EnumCalendarInfoA
0x41e2f8 CreateMutexA
0x41e2fc CreateFileA
0x41e300 CreateEventA
0x41e304 CompareStringA
0x41e308 CloseHandle
Library user32.dll:
0x41e310 MessageBoxA
0x41e314 LoadStringA
0x41e318 GetSystemMetrics
0x41e31c CharNextA
0x41e320 CharUpperBuffA
0x41e324 CharToOemA
Library kernel32.dll:
0x41e32c Sleep
Library wsock32.dll:
0x41e334 WSACleanup
0x41e338 WSAStartup
0x41e33c gethostname
0x41e340 gethostbyname
0x41e344 socket
0x41e348 send
0x41e34c recv
0x41e350 inet_ntoa
0x41e354 htons
0x41e358 connect
0x41e35c closesocket
Library oleaut32.dll:
0x41e364 SafeArrayPtrOfIndex
0x41e368 SafeArrayGetUBound
0x41e36c SafeArrayGetLBound
0x41e370 SafeArrayCreate
0x41e374 VariantChangeType
0x41e378 VariantCopy
0x41e37c VariantClear
0x41e380 VariantInit
Library crypt32.dll:
0x41e388 CryptUnprotectData

Exports

Ordinal Address Name
2 0x41a474 Main
1 0x41a930 Save
This program must be run under Win32
.idata
.edata
P.reloc
P.rsrc
StringX
TObjectd
TObjectX
System
IInterface
System
TInterfacedObject
YZ]_^[
Ht Ht.
~KxI[)
SOFTWARE\Borland\Delphi\RTL
FPUMaskValue
_^[YY]
ZTUWVSPRTj
_^[YY]
_^[YY]
kernel32.dll
GetLongPathNameA
Software\Borland\Locales
Software\Borland\Delphi\Locales
_^[YY]
Exception@k@
EHeapException
EOutOfMemory
EInOutErrorPl@
EExternal
EExternalException
EIntError
EDivByZero
ERangeError
EIntOverflow
EMathError
EInvalidOp
EZeroDivideto@
EOverflow
EUnderflow
EInvalidPointer
EInvalidCast
EConvertError
EAccessViolation
EPrivilege
EStackOverflow
EControlC
EVariantError
EAssertionFailed
EAbstractError
EIntfCastError
EOSError
ESafecallException
SysUtils
SysUtils
TThreadLocalCounter
$TMultiReadExclusiveWriteSynchronizer
<*t"<0r=<9w9i
INFNAN
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
t%HtIHtm
_^[YY]
$Z]_^[
QQQQQQSVW3
QQQQQSVW
_^[YY]
TErrorRec
TExceptRec
$YZ]_^[
m/d/yy
mmmm d, yyyy
:mm:ss
kernel32.dll
GetDiskFreeSpaceExA
YZ]_^[
YZ]_^[
YZ]_^[
9ee64c9522e00b3fe2dbacd05c500ac8
c3c65\
2660bY
wh}oZh5
a8e9aJ
03da88
03da88
03da88
QQQQQQQSVW
0x%.2x%.2x%.2x%.2x%.2x%.2x
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
!!!!<own>!
Winbox
abcdefghijklmnopqrstuvwxyz1234567890,.:@#$%^&*(){}~<>?
QQQQQQQSVW
\Mikrotik\Winbox\Addresses.cdb
oleaut32.dll
VariantChangeTypeEx
VarNeg
VarNot
VarAdd
VarSub
VarMul
VarDiv
VarIdiv
VarMod
VarAnd
VarXor
VarCmp
VarI4FromStr
VarR4FromStr
VarR8FromStr
VarDateFromStr
VarCyFromStr
VarBoolFromStr
VarBstrFromCy
VarBstrFromDate
VarBstrFromBool
TCustomVariantType
TCustomVariantType
Variants
EVariantInvalidOpError
EVariantTypeCastError
EVariantOverflowError
EVariantInvalidArgError\
EVariantBadVarTypeError
EVariantBadIndexError
EVariantArrayLockedError
EVariantArrayCreateError
EVariantNotImplError
EVariantOutOfMemoryError
EVariantUnexpectedError$
EVariantDispatchError
QQQQSV
Smallint
Integer
Single
Double
Currency
OleStr
Dispatch
Boolean
Variant
Unknown
Decimal
ShortInt
LongWord
String
Array
ByRef
Variants
_^[YY]
EStreamError
EFileStreamError
EFCreateError
EFOpenError
EFilerError
EReadError
EWriteError
EListError
EStringListError
TThreadList
TPersistent
TPersistent
Classes
IStringsAdapter
Classes
TStrings
TStrings
Classes
TStringItem
TStringList
TStringList
Classes
TStream
THandleStream
TFileStream
TRegGroup
TRegGroups
Strings
S$_^[Y]
_^[YY]
SdZ]_^[
$Z]_^[
_^[YY]
ERegistryException
TRegistryS
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\
Outlook
IMAP User
IMAP Password
POP3 User
POP3 Password
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
QQQQQQSVW
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
QQQQQQ
<Host>
</Host>
FileZilla
<User>
</User>
<Pass encoding="base64">
</Pass>
\FileZilla\sitemanager.xml
PSAPI.dll
EnumProcesses
EnumProcessModules
GetModuleBaseNameA
GetModuleFileNameExA
GetModuleBaseNameW
GetModuleFileNameExW
GetModuleInformation
EmptyWorkingSet
QueryWorkingSet
InitializeProcessForWsWatch
GetMappedFileNameA
GetDeviceDriverBaseNameA
GetDeviceDriverFileNameA
GetMappedFileNameW
GetDeviceDriverBaseNameW
GetDeviceDriverFileNameW
EnumDeviceDrivers
GetProcessMemoryInfo
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
<protocol>
</protocol>
<name>
</name>
<password>
</password>
Pidgin
\.purple\accounts.xml
\Wcx_ftp.ini
username=
password=
Local Settings\Software\Microsoft\Windows\Shell\MuiCache
\wcx_ftp.ini
\wcx_ftp.ini
SOFTWARE\RealVNC\vncserver\Password
SOFTWARE\RealVNC\vncserver\RfbPort
SOFTWARE\RealVNC\vncserver\HttpPort
RealVNC
SOFTWARE\RealVNC\WinVNC4\Password
SOFTWARE\RealVNC\WinVNC4\PortNumber
SOFTWARE\TightVNC\Server\Password
SOFTWARE\TightVNC\Server\RfbPort
SOFTWARE\TightVNC\Server\HttpPort
TightVNC
SOFTWARE\TightVNC\Server\PasswordViewOnly
QQQQQQQ3
SOFTWARE\TigerVNC\WinVNC4\Password
SOFTWARE\TigerVNC\WinVNC4\PortNumber
SOFTWARE\TigerVNC\WinVNC4\HTTPPortNumber
TigerVNC
QQQQSVW
HostName=
UserName=
Password=
WinSCP
\winscp.ini
WinScp
Local Settings\Software\Microsoft\Windows\Shell\MuiCache
winscp
QQQQQQQQ
Software\Martin Prikryl\WinSCP 2\Sessions\
\HostName
\UserName
\Password
WinSCP
Software\Martin Prikryl\WinSCP 2\Sessions
HTTP/1.1
Host:
Content-Length:
Content-Type: application/x-www-form-urlencoded
QQQQSVW
QQQQQQQS
&cred=
Runtime error at 00000000
0123456789ABCDEF
%.*d$i@
Qkkbal
;3+#>6.&
'2, /+0&7!4-)1#
0123456789ABCDEF<i@
kernel32.dll
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
user32.dll
GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
advapi32.dll
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
oleaut32.dll
SysFreeString
SysReAllocStringLen
SysAllocStringLen
kernel32.dll
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
advapi32.dll
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegOpenKeyA
RegFlushKey
RegEnumValueA
RegEnumKeyA
RegEnumKeyExA
RegCreateKeyExA
RegCloseKey
OpenThreadToken
OpenProcessToken
IsValidSid
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
GetSidIdentifierAuthority
kernel32.dll
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQuery
SetLastError
SetFilePointer
SetEvent
SetEndOfFile
ResetEvent
ReadFile
OpenProcess
LocalFree
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
HeapFree
HeapAlloc
GetVersionExA
GetThreadLocale
GetStringTypeExA
GetStdHandle
GetProcessHeap
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetLastError
GetFullPathNameA
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
GetCPInfo
GetACP
FormatMessageA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
EnumCalendarInfoA
EnterCriticalSection
DeleteCriticalSection
CreateMutexA
CreateFileA
CreateEventA
CompareStringA
CloseHandle
user32.dll
MessageBoxA
LoadStringA
GetSystemMetrics
CharNextA
CharUpperBuffA
CharToOemA
kernel32.dll
wsock32.dll
WSACleanup
WSAStartup
gethostname
gethostbyname
socket
inet_ntoa
connect
closesocket
oleaut32.dll
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
crypt32.dll
CryptUnprotectData
cred.dll
0,080<0@0D0H0L0P0T0`0m0
1 1(1,1014181<1@1D1H1b1j1r1z1
2"2*222:2B2J2R2Z2b2j2r2z2
3!3N3Y3(4/4
;,;7;B;J;T;^;h;~;
<<'<2<8<E<J<o<y<
2F2K2P2
585>5P5h5t5|5
5+63696?6r6
6T7\7b7h7u7{7
949@9H9
:3:L:e:v:
<#=L=S=Z=*>?>r>
>$?+?f?
1"1D3K3\3h3
4w5/6G6X6t6
819A9W9u9
<Z=n=v=
>">,>?>o>
#1K1R1j1
3"3'3,31363D3N3y3
3$4/4L4V4{4
515E5Q5j5
;";b;i;};
2$2-292C2j2
213O3Y3d3x3
44)4G4L4_4k4x4
5"5*525:5B5J5R5Z5b5j5r5
6"6*626:6B6J6R6Z6b6j6r6z6
7"7S7_7l7~7
8$8,848<8D8L8T8\8d8l8t8|8
9$9,949<9D9L9T9\9d9l9t9|9
:$:,:4:<:D:L:[:g:t:
; ;$;(;,;0;4;8;<;P;p;x;|;
<$<,<0<4<8<<<@<D<H<L<\<|<
=4=<=@=D=H=L=P=T=X=\=l=
> >@>H>L>P>T>X>\>`>d>h>x>
?(?H?P?T?X?\?`?d?h?l?p?
0 040T0\0`0d0h0l0p0t0x0|0
1 1$1(1,10141L1l1t1x1|1
2 2(2,2024282<2@2D2H2X2x2
343<3@3D3H3L3P3T3X3\3p3
4$4D4L4P4T4X4\4`4d4h4l4
5 5x5|5
5T6m:}:
:Z;m;y;
3f4Q6}6
717L7P7T7X7\7
5(6,6064686<6@6D6H6L6P6T6X6\6`6d6M7g7
=!>t>.?r?w?
20S0f0n0
1&2<2I2N2`2
7.737?7b7
8?8I8o8
8+9:9T9f9
<V<^<i<
0%080P0o0w0
1.2_2y2
5$5)5/565<5A5G5L5R5Y5_5j5r5{5
6-686=6v6
8%999_9s9p;
<5<A<Z<d<n<
=A=_=|=
>%>@>I>d>w>
?.?7?K?Y?m?
0.060K0S0p0}0Z1M2r2
2(3R3b3m3s3{3
588<8@8D8H8L8P8T8X8\8`8d8h8l8p8t8x8|8
9$9(90949<9@9H9L9T9X9`9d9l9p9x9|9
: :$:,:0:8:<:D:H:P:T:\:`:h:l:t:x:
;";6;A;K;V;`;k;u;
<&<0<:<D<N<X<b<t<
=&=.=6=>=F=N=V=c=o=|=
8?8K8X8j8{9
:*:4:9:
?g?s?z?
4"4C4U4
6"6'6.636=6G6Q6X6o6
:+:7:D:V:^:f:n:v:
?+?0?;?A?F?Q?W?\?g?m?r?}?
0"0-03080C0I0N0Y0_0d0o0u0z0
1+272D2V2
3 3$3(3,3034383P3h3l3
4 4$4(4,4H4h4p4t4x4|4
50585<5@5D5H5L5P5T5X5t5
6 6@6`6h6l6p6t6x6|6
7,74787<7@7D7H7L7P7T7t7
8 8E8S8b8y8
959C9R9i9
9%:3:B:Y:
;=;L;c;r;
<-<><p<
4 5=5u5
5(6^6z6~6
99#9'9+9/93979;9?9C9G9K9O9S9W9+;
<*=G=}=
0!0%0)0-0105090=0A0E0I0M0Q0U0Y0]0a0e0i0=2X4w4
5-5@5R5
6,6F6K6
91969W9c9o9y9
:$:+:1:8:>:E:K:R:d:t:|:
;O;[;b;l;w;
< <4<T<\<`<d<h<l<p<t<x<|<
= =$=(=,=0=4=8=H=h=p=t=x=|=
> >$>(>,>0>4>8><>@>P>p>x>|>
?(?0?4?8?<?@?D?H?L?P?T?X?\?`?l?
0"0&080I0M0`0u0
1 1$1(1,1014181<1@1D1H1L1P1T1X1\1`1n1
2 2$2(2,2024282<2@2D2H2L2P2T2X2\2`2d2h2l2p2t2x2|2
3 3$3(3,3034383<3@3D3P3p3x3|3
4 4$4(4,4<4\4d4h4l4p4t4x4|4
9%979b9
;<&<=<
>6>c>|>
>?n?w?
4@5R5o5
4Y5`5w5
;;;?;C;G;K;O;S;W;[;_;c;g;k;o;s;w;{;
?:???Q?o?{?
00+080D0W0c0m0t0~0
141<1@1D1H1L1P1T1X1\1t1
6?7K7R7]7o7
<)<0<?<S<w<
=:=X=_=
=H?S?m?
3)3B3j3
434;4B4\4q4
9&9+989=9J9O9\9a9n9s9
:":':4:9:F:K:X:]:j:o:|:
?,?I?^?s?
0<0m0r0w0~0
809b9%:=:
=1=C=O=V=`=r=
m0r0h2w2
3.3=3L3Y3
4*4v435
616[6f6
707B7T7d7i7n7u7z7
8 8%8.8N8U8l8
: :):I:P:_:y:
;);;;M;];b;g;n;s;{;
<#<+<0<9<Y<`<w<
>)>0>?>Y>k>}>
0;0G0N0X0j0z0
6!7&7+72777A7K7m7t7
<#<+<M<U<w<
?#?*?<?N?w?
5#5E5X5h5p5
7!7)7.767;7C7\7
: :$:(:,:0:4:8:<:@:D:H:L:P:T:X:\:`:d:h:l:p:t:x:|:
<0@0D0
0X1`1d1
2 2$2(2,2024282<2@2D2
3 3(383<3@3D3H3L3P3T3X3\3`3d3
2 2$2(2,2024282<2@2D2H2L2P2T2X2\2`2d2h2l2p2t2x2|2
3 3$3(3,3034383<3@3D3H3L3P3T3X3\3`3d3h3l3p3t3x3|3
TlHelp32
System
SysInit
KWindows
UTypes
Base64
8Registry
"RTLConsts
^Classes
SysConst
3Messages
SysUtils
CVariants
$VarUtils
QTypInfo
sActiveX
IniFiles
MiniReg64
Stealer_Var
Stealer_WinSCP
Stealer_VNC
WinSock
|Stealer_TotalCmd
Stealer_Pidgin
PStealer_FileZilla
rStealer_MSOutlook
Stealer_Winbox
UserSid
jjjjjjj
DVCLAL
PACKAGEINFO
List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d)
Stream read error
Failed to get data for '%s'
%s.Seek not implemented$Operation not allowed on sorted list
Stream write error
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Cannot assign a %s to a %s%String list does not allow duplicates
Cannot create file "%s". %s
Cannot open file "%s". %s
Invalid property value
Invalid data type for '%s'
January
February
August
September
October
November
December
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
%sA call to an OS function failed
Variant or safe array is lockedInvalid variant type conversion
Invalid variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Variant overflow
Invalid argument
Invalid variant type
Operation not supported
Unexpected variant error
External exception %x
Assertion failed
Interface not supported
Exception in safecall method
%s (%s, line %d)
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Access violation
Stack overflow
Control-C hit
Privileged instruction(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
Write$Error creating variant or safe array)Variant or safe array index out of bounds
Out of memory
I/O error %d
File not found
Invalid filename
Too many open files
File access denied
Read beyond end of file
Disk full
Invalid numeric input
Division by zero
Range check error
Integer overflow Invalid floating point operationFloating point division by zero
Floating point overflow
Floating point underflow
Antivirus Signature
Bkav Clean
Lionic Clean
tehtris Clean
MicroWorld-eScan DeepScan:Generic.Malware.FPf.4CF24725
ClamAV Win.Malware.Zusy-9753108-0
FireEye Generic.mg.3966ebb55d701a2b
CAT-QuickHeal Trojan.Amaday.S28469649
McAfee PWS-FDNA!3966EBB55D70
Cylance Unsafe
Zillya Clean
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_90% (D)
BitDefender DeepScan:Generic.Malware.FPf.4CF24725
K7GW Trojan ( 7000000f1 )
K7AntiVirus Trojan ( 7000000f1 )
Baidu Clean
VirIT Trojan.Win32.Genus.LVY
Cyren W32/Delf.RN.gen!Eldorado
Symantec Trojan.Amadey!g1
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/PSW.Delf.OTR
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan-PSW.Win32.Decred.a
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Stealer.Agent!1.C48C (CLASSIC)
Ad-Aware DeepScan:Generic.Malware.FPf.4CF24725
Emsisoft Trojan-PSW.Delf (A)
Comodo Clean
F-Secure Heuristic.HEUR/AGEN.1233121
DrWeb Trojan.SpyBot.1164
VIPRE DeepScan:Generic.Malware.FPf.4CF24725
TrendMicro TrojanSpy.Win32.AMADEY.SM
McAfee-GW-Edition PWS-FDNA!3966EBB55D70
Trapmine Clean
CMC Clean
Sophos Troj/Amadey-J
Ikarus Trojan-PSW.Delf
GData DeepScan:Generic.Malware.FPf.4CF24725
Jiangmin Clean
Webroot Clean
Avira HEUR/AGEN.1233121
MAX malware (ai score=83)
Antiy-AVL Trojan[PSW]/Win32.Decred
Gridinsoft Clean
Arcabit DeepScan:Generic.Malware.FPf.4CF24725
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-PSW.Win32.Decred.a
Microsoft Trojan:Win32/CryptInject.SBR!MSR
Google Detected
AhnLab-V3 Trojan/Win.Delf.R452782
Acronis suspicious
VBA32 TScope.Trojan.Delf
ALYac DeepScan:Generic.Malware.FPf.4CF24725
TACHYON Clean
Malwarebytes Generic.Spyware.Stealer.DDS
Panda Trj/Genetic.gen
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
SentinelOne Clean
MaxSecure Clean
Fortinet W32/Delf.QYF!tr.spy
BitDefenderTheta Clean
AVG Win32:BotX-gen [Trj]
Avast Win32:BotX-gen [Trj]
No IRMA results available.