Static | ZeroBOX

PE Compile Time

2103-10-13 12:19:28

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00018564 0x00018600 6.36666522993
.rsrc 0x0001c000 0x000048c6 0x00004a00 4.89168714192
.reloc 0x00022000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0001c130 0x00004228 LANG_NEUTRAL SUBLANG_NEUTRAL dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
RT_GROUP_ICON 0x00020358 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x0002036c 0x00000370 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000206dc 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
X Z&+/ "
}@B W*
X 9$oR =N
Xa DUBA %-
Xa O!Q
X %01}
UyK yx
lYj pO
`r> *?
X /X\k
X D;WS
X 01[m 
X D;K>
X Tnci
T9# vx
=\f >8
Xa E\_
X <Ga}
Xa V%Zs
Xa K>=
Xa K>#9 ]
Xa L7-o b
/c5 mK
X oTdW
6x H$
X Q=@S :
X 3_ d 9
X NX$: }e
?6z D
X 9tMo
X <>GS
X _{zs
X f.xS 5
X NU:c
Xa xgUx
Xa MYqz
X fl!M D
X _Q41
ia u$f
<mDI
?w ka)a
a I^Nx@
RVa @n`K@
E u8|sa <
RJ(ga
Xa @pVc
T = X#
Xa ZgZY
Xa NY56
4* 5;
Xa k:3_ <
X *h|8 ^a
X ?#7,
lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
hSystem.Drawing.Bitmap, System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3aPADPAD
QSystem.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
+iCCPPhotoshop ICC profile
c``2ptqre
> v^~^*
IDATx^
fc9d{u
fc9dku
]fS9d[u
fC9dKu
f39dKu
f39d;u
g#9d+u
e!9d)u1
bB9dZu
a"9d*u
TuiNQy
TuiNQy
4uaNQy
4uYNQy
4uYNPY
YTgOPYp
TwOPYp
[RxNr}
[QtNq}
[Ppvw}
[Ppvw}
[PpNp}
[RxNt}
v]"<Ve
QSystem.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
+iCCPPhotoshop ICC profile
c``2ptqre
> v^~^*
IDATx^
ca9diuqy
3`A9dYuYy
>u&|^e
.%Sy2
=/UnL,
vu9NPY
Vu)NPY
!r8H}Q
[S|Nv]
u.:"Ry
QSystem.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a
System.Drawing.Bitmap
+iCCPPhotoshop ICC profile
c``2ptqre
> v^~^*
IDATx^
esYd{u
jfNW}b2YdJ
vW}`3u
vW}`3u
vW}`3u
vW}`3u
vW}`3u
vW}`3u
vW}`3u
vW}`3u
vW}`3u
vW}`3u
lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
PADPADP
v4.0.30319
#Strings
<>c__DisplayClass0_0
<>9__1_0
<PerformAntiVM>b__1_0
<get_Directories>b__1_0
<limitTimer_tick>b__9_0
<PerformAntiTaskManager>b__0
dcIj21
<>c__DisplayClass0_1
<>9__1_1
<get_Directories>b__1_1
<>9__1
<PerformAntiTaskManager>b__1
IEnumerable`1
IEnumerator`1
List`1
dwItem1
<>7__wrap1
CS$<>8__locals1
bNHnt1
<>m__Finally1
Microsoft.Win32
UInt32
ToInt32
wQaAF2
wPOST2
<>9__1_2
<get_Directories>b__1_2
Func`2
wL41i2
dwItem2
<>7__wrap2
<>9__1_3
<get_Directories>b__1_3
<GetFiles>d__3
rYevj3
<>7__wrap3
FromBase64
ToBase64
<>9__1_4
<get_Directories>b__1_4
<GetFiles>d__4
eafr75
bbMHD5
ztxDQ5
mRz6_7
wk2Sj7
get_UTF8
get_RSA
set_RSA
lbGo_A
hnKIwA
aoA8FB
ga2wYC
get_KeyID
set_KeyID
srINsD
o3DGiE
fl0NuG
rILvXH
nFtRBI
tqPRfI
tT6xPK
um0oXL
ccDIhM
isTU5O
System.IO
hWFg4T
get_IV
GenerateIV
dpHFNW
wq7dfW
pQDQsY
fPYfAZ
wx99F_
xeBE4a
get_Data
set_Data
DecryptData
EncryptData
FromArgb
mscorlib
yadZqb
System.Collections.Generic
Ilzcmraefsygrsiysifioc
WndProc
Iyorbdlzopozyttuswceuc
get_Id
get_CurrentManagedThreadId
<>l__initialThreadId
wEventId
get_KeyId
set_KeyId
OpenRead
Thread
get_IsAttached
get_Locked
get_Blocked
get_Unlocked
set_Enabled
get_HasExited
get_Hand
Append
RegistryValueKind
set_IsBackground
w2du2e
n3VzEe
Replace
FlatButtonAppearance
get_FlatAppearance
set_Mode
set_AutoScaleMode
set_SizeMode
PictureBoxSizeMode
PaddingMode
CryptoStreamMode
CompressionMode
CipherMode
DeleteSubKeyTree
set_Image
set_InitialImage
get_KeyStorage
set_KeyStorage
get_Message
SendMessage
InputLanguage
AddRange
get_KeyTable
set_KeyTable
ReadKeyTable
GetEnvironmentVariable
IEnumerable
IDisposable
get_Visible
set_Visible
get_Handle
GetModuleHandle
RuntimeTypeHandle
GetTypeFromHandle
Single
DecryptFile
EncryptFile
IsInRole
WindowsBuiltInRole
Console
set_Title
DockStyle
set_BorderStyle
set_FormBorderStyle
set_FlatStyle
FontStyle
set_WindowStyle
ProcessWindowStyle
get_Name
set_Name
get_TwoLetterISOLanguageName
get_FileName
set_FileName
GetFileName
get_FullName
get_ProcessName
WriteLine
get_NewLine
Combine
set_Multiline
ValueType
get_DriveType
OfType
System.Core
ToStructure
get_Culture
set_Culture
ReleaseCapture
ReadOnlyCollectionBase
ButtonBase
TextBoxBase
System.IDisposable.Dispose
Reverse
EditorBrowsableState
SetApartmentState
set_WindowState
FormWindowState
<>1__state
Delete
STAThreadAttribute
CompilerGeneratedAttribute
GuidAttribute
GeneratedCodeAttribute
DebuggerNonUserCodeAttribute
DebuggableAttribute
EditorBrowsableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
IteratorStateMachineAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
DebuggerHiddenAttribute
ExtensionAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
set_UseShellExecute
GetValue
SetValue
Remove
set_Size
get_BlockSize
set_BlockSize
set_AutoSize
get_ClientSize
set_ClientSize
Serialize
Deserialize
ISupportInitialize
q7xlSf
zRk5ag
Iehpevizzvuvladegnujgg
System.Threading
set_Padding
Encoding
System.Drawing.Imaging
IsLogging
System.Runtime.Versioning
FromBase64String
ToBase64String
FromXmlString
DecryptBytesToString
GetString
get_AppStarting
System.Drawing
OpenFileDialog
CommonDialog
ShowDialog
get_Msg
GetTempPath
GetFolderPath
get_Width
get_Length
set_MaxLength
StartsWith
Iiiytefnrmmuvvxmrcmyji
fuWinIni
Imcajovedepwlcsqmddydj
add_Tick
add_Click
buttonBrowsePrivateKeyFile_Click
buttonMinimize_Click
buttonExit_Click
buttonDecrypt_Click
limitTimer_tick
set_Dock
FlushFinalBlock
hC6Yek
c8YxNl
System.Security.Principal
WindowsPrincipal
set_Interval
System.ComponentModel
CompressionLevel
kernel32.dll
shell32.dll
User32.dll
user32.dll
Srclient.dll
IsNull
get_Control
ContainerControl
Ieeiajmqaotddkllqroqul
DeflateStream
FromStream
CryptoStream
MemoryStream
get_LParam
lParam
uParam
lpvParam
wParam
get_Item
System
xl_ehm
SymmetricAlgorithm
AsymmetricAlgorithm
ICryptoTransform
s6zmzm
xxvEKn
TimeSpan
set_TextAlign
SeekOrigin
set_ShowIcon
MessageBoxIcon
get_Extension
GetFileNameWithoutExtension
System.IO.Compression
Application
get_Location
set_Location
System.Globalization
uAction
System.Reflection
InputLanguageCollection
ControlCollection
ManagementObjectCollection
SearchOption
CryptographicException
NotSupportedException
get_Button
add_MouseDown
OnMouseDown
MoveTo
CopyTo
FileInfo
CultureInfo
DriveInfo
FileSystemInfo
SystemParametersInfo
ProcessStartInfo
DirectoryInfo
Ihgiudjfztykgjxjuptnuo
Bitmap
c1Okgp
get_Bmp
set_TabStop
dAXlUq
System.Linq
fhmeqq
slHG0r
e3K_2r
ToChar
xv1Ydr
RSACryptoServiceProvider
RNGCryptoServiceProvider
AesCryptoServiceProvider
StringBuilder
SpecialFolder
get_ResourceManager
Debugger
ManagementObjectSearcher
get_Cipher
set_Cipher
MouseEventHandler
System.CodeDom.Compiler
IContainer
ToUpper
IsUpper
CurrentUser
BinaryWriter
set_Filter
Register
BinaryFormatter
ToLower
<>3__targetDir
set_Anchor
set_ForeColor
set_BackColor
set_UseVisualStyleBackColor
set_MouseDownBackColor
set_MouseOverBackColor
set_Cursor
IEnumerator
ManagementObjectEnumerator
System.Collections.Generic.IEnumerable<System.IO.FileInfo>.GetEnumerator
System.Collections.IEnumerable.GetEnumerator
RandomNumberGenerator
.cctor
CreateDecryptor
CreateEncryptor
IntPtr
ogbU7s
System.Diagnostics
FromSeconds
System.Runtime.InteropServices
System.Runtime.CompilerServices
GetInstances
System.Resources
Eternity.MainForm.resources
Eternity.Properties.Resources.resources
DebuggingModes
get_InstalledInputLanguages
get_Directories
GetAllFiles
GetFiles
AnchorStyles
GetValueNames
GetProcesses
ReadAllBytes
WriteAllBytes
EncryptStringToBytes
GetBytes
GetDrives
uFlags
MouseEventArgs
get_Controls
System.Windows.Forms
Contains
set_AutoScaleDimensions
System.Collections
ObjectGetOptions
MouseButtons
MessageBoxButtons
get_Chars
SystemColors
Cursors
ManagementClass
GetCurrentProcess
Compress
Decompress
set_Arguments
get_Exists
set_CheckFileExists
get_rkEncryptedKeys
set_rkEncryptedKeys
Concat
AppendFormat
ImageFormat
ManagementBaseObject
GetObject
ManagementObject
Select
System.Net
System.Collections.IEnumerator.Reset
get_TimeLeft
set_TimeLeft
get_Height
op_Explicit
EndInit
BeginInit
GraphicsUnit
WaitForExit
FirstOrDefault
set_Result
DialogResult
WebClient
PointToClient
System.Management
ContentAlignment
Environment
InitializeComponent
System.Collections.Generic.IEnumerator<System.IO.FileInfo>.Current
System.Collections.IEnumerator.Current
System.Collections.Generic.IEnumerator<System.IO.FileInfo>.get_Current
System.Collections.IEnumerator.get_Current
GetCurrent
<>2__current
SRRemoveRestorePoint
set_Font
Decrypt
<>3__for_decrypt
Encrypt
ThreadStart
Convert
blacklist
set_TopMost
SuspendLayout
ResumeLayout
PerformLayout
MoveNext
System.Text
get_Text
set_Text
AppendText
ReadAllText
ToText
ResetText
DecryptText
EncryptText
wODf2v
frw56v
yN_yiv
wRH71w
bSaC7w
wesESw
IWin32Window
set_CreateNoWindow
avsW8x
yT9NFx
set_TabIndex
MessageBox
PictureBox
set_ControlBox
TextBox
yKUcPy
ToByteArray
ToArray
ToCharArray
get_Key
set_Key
CreateSubKey
OpenSubKey
ImportRSAPrivateKey
get_HasPrivateKey
SaveKey
GetKey
RegistryKey
SHChangeNotify
System.Security.Cryptography
dBHLiy
get_Assembly
GetExecutingAssembly
GetEntryAssembly
get_PublicOnly
set_ReadOnly
set_IsReadOnly
System.Runtime.Serialization.Formatters.Binary
CreateDirectory
set_InitialDirectory
GetCurrentDirectory
get_RootDirectory
Registry
op_Equality
op_Inequality
WindowsIdentity
IsNullOrEmpty
WrapNonExceptionThrows
Windows Security Services
Copyright
Microsoft 2021
$6493f1a6-4642-4b6f-abad-dea8a91e07a3
1.0.0.4
.NETFramework,Version=v4.7.2
FrameworkDisplayName
.NET Framework 4.7.2
rEternity.Ransomware.EncryptionTargets+<GetFiles>d__3, stjtb, Version=1.0.0.4, Culture=neutral, PublicKeyToken=null
rEternity.Ransomware.EncryptionTargets+<GetFiles>d__4, stjtb, Version=1.0.0.4, Culture=neutral, PublicKeyToken=null
3System.Resources.Tools.StronglyTypedResourceBuilder
17.0.0.0
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
Blocked
Locked
Unlocked
%?<f@$0!!bb
l54Dbr
%) &7.
cuHG2y
&=g?!s(
j9yyTY
7b4v6g1
TC}3*b
BSbm$Dd2P
+m' um@
BN@W.T
T3BnBhD:
)+2<7#3
jnkWjV
*,c=$g*'b41f;
!*9u*p'
thpTo6
u6Fxp6
'xf!lG"xf/ca%VSB
TGW_Y
eKfE9_
:$6^ -%7%>
:3#990-
j'x)|+R
wQEd6E
L:9>,'&
K ?Q4':=
Failed kill process {0}, {1}
#15j.,4
kG4tkB
'#H*=9H*:>H*62
zfOqXP
sIa6P4
0;'76%
gMVizB
9d.3>&P#4/9o7
eicNOd
)-$#!&:)87$
<`0n8b
(b/.c/,v51W8+U4"x4
bQdfST
3{2?C*3q':
7a/6Bl<
F./%::
2'2d-7$
zmbr6A
58y$"XP$J
fhsrB2
khPiLK
g#x(a-c7g
i#S9c)m7x$
nnb4uX
22vN?
;9""!G
X%0$2
= #gI#"
<%S3'@
[%)"Y$
1;:&`
':5.">(%3+37tbD"?%1:*:
>4"MEA4
/791E/
)@JF$2
&"GELF
tbtbH*).^$-:*5^;)
^.?"^C1!7%390 ^!?W->^$7?"WJ.-63W">^:56
WH."%3))'^;(6^%?(^9)W-63%?W(>^:*'):.W'%?!7;, ^ "W-;(*0W,*)W0 ^ZNH^:"6( 2W3
^A397#^%# 'W( ^:,*-$3%.W'!?W3$#6=W" (W*#7(^+7WJ$,6*#);^9)W-!3+^ "W"!3#?)7*/:^.*!)W->^?=>6(^C+ -!?%^?1>6W?W, 0W1!7<-6^$,:54??^.2:3%1W,:6+)W3<7#(
^A+ -!?%^:6+^.?'^*).^97W(: :^.3<^:"6 >,'^:6+^+38^+Q!?4^*).^!3?"W3$#6=:<WJ
^$# 747#?"^+)!^C( 7+..,4(:^47%":+"'$^
^8(>-*^C+63+^#?47?":^!?W3%?W3
tbtbW*).^ "W'#.:,W" (W*#7(^:=> %3$^%3")+-*=W3?"W3$7(,:6+)WJ+&:"W'!?W,:"!3W" (W);^C'#"43%7;^%3?=*))^!)>"4?$(6,+^:6+^8(>(>?+( =W3%#+=>.W3?"W2!3$^:-63#._^:*>0W':5W3?"W(>?+< ^ "W347),:-W,:+ "$#4^%# ^;26^C+6,83#3
^%# ^+=6"!)4^!3?"WJ%3?=*))^!)>"4?$(6,+^:6+^+)?-!3:,4-WJ$-:,;26^;3+?!1>-:2W3?"W)+^8(>,%39-!?%"W,:"9}k}kAW;3+?")+#6^#*6^$Q+7_^$! (<^:( ^ (W2!?W">^'3:5W"X( 2W3(^C2:(%#5^$7W?+?;^:6+^C263+-!
WH$3#79^;3+..,4(:(*^8(>2**4(>^C=>*5#'^:26+W35^#*>!W,:"*.")4^%# 'W( ^6"62W3?"W*#?WJ:+>"W2:"+)#*6^:6+^!7?">!W':( +W3?"W,:0$(6,+^+Q!);^*).^97W3%3?!WJ!)>"4?%"/
^+# <6^:" ,(^ -#?W3
^A2:"63?=W(: :^%)WJ
@ANW(66+^;3+-6!W':( +W3%)"^C3#7+#9^$7W">^:->+ ,'^
^C-#) "W-*,> >"!?W, ^!)>"''%=:2W, 0W1!7<) *W3"7+^%# 'W3+-6!W"X( 2W3$?:*'^C2:,6.:,'^.*##9^:,6^:
WH;3+..,4(:^.*+(:(6+%3'^:<W*#7(^:*>0W3?"W3$7(,:6+)WJ^34(6(>
W, ^:-6<!7
W-6^?=*-WJ:1!??=/3W'!?W( ^%39-!?%"W3?"W'*<W(6=W# '_^.3<^:"6 >,'^:6+^+38^ "W-%# 6WFK^!7?">!W-$3%2;?W2:"6(87$3;^:6+^ "W
W@ANW,:0$(6,+^:-63#.WJ;3<= *W->^%3+#'+ =W,*)
2!3W3?"W)+^8?%2W)+^:-*)"^:6+^:-*^:-63#.WJ *#3
=2;,@@+%=RR67$@@**"RR4$'@@$75RRVC0@@?%"RR463@@&4!RR;*7@@)4%RR4!5@@%$ERR83-@@?$ERR763@@%4!RR'*7@@54%RR*;$@@=,%RRV4;@@"$!RR0&3@@68%RR$&7@@"3'RR+63@@94!RR-*7@@>-?RR93,@@H93,@@573RRW74;,#7@@4$74;,#7@@>1%RR&6'5!@@4$?RR&6RR*4$@@4$!RR-$*@@69?RR)+-@@6&;@@@8$?RR*6,@@ ,%RR3'7@@%'@@5RR0"'@@%!"RR(@@?73RR7<RR$?'@@&!4RRQ%0@@%&(RR&(RR,"RR0;$@@:'6RR(57@@664RR0%.@@"("RR0%!@@46@@3:3.@@$!<RR7%!>'@@:7@@E0?RR:3;@@8;%RR!>*@@(-)RR+"-@@43(RR+70?RR*%!@@;:3RR:!-@@F0?RR09W@@(/?RRV9W@@(,8RR!?;@@6)?RR5E-@@'T?RR5(.6@@@9:%RR)3RR$%0@@8% RR*8)&RR*;4@@?+5RR;36@@8)9RR+ 0@@"-4RR$5:@@!7;RR0'/5!4RR0;>@@$!$RR>IRR>9RR>94@@$!&RR/3&@@=&&RRV,&@@
@@%%3RR+"+@@*-(RR/6-(RR)6:@@?$>7@@?$>7@@*$>7@@;4%RR)*7@@DPHRR0)(@@4$7RR-&3"RR8&3"RR-30"RR8%0"RR-%0"RR7"0@@&3"RR-&0"RR-&,*RR8&,*RR'>8@@?,*@@@&,*RR;>8@@47>8@@?7>8@@*4!$@@?4!$@@&36RR-536RR&536RR+".@@9%".@@&2%RRV53&% 3@@9;6RR*60@@C/)RR7=;@@EVCRR*&6@@(75RR4*4@@*$%:@@67(RR,?%@@97?RR4%3@@&7"RR8&0"RR4"0@@*7>8@@%,*RR8536RR'!$@
/!070=&
D/t2.!=:
ovRVmi
29?$ %
qfmejc
46V(':
0-4 !1&
/-(,$2.?%$;27/'$#6
!91!.">7%9.%>'
-c&x9g
q g&c5DRq&q>q
aNmr0s
-++j QBc%'U
"95{0.1
<:/c<*Ba83.v"5<
fRKIVS
1d%="%
7?535&13
-&)&$:)
zW6IwY
?$:<29)
TimeLeft
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
Windows Security Services
FileVersion
1.0.0.4
InternalName
Eternity.exe
LegalCopyright
Copyright
Microsoft 2021
LegalTrademarks
OriginalFilename
Eternity.exe
ProductName
Windows Security Services
ProductVersion
1.0.0.4
Assembly Version
1.0.0.4
Antivirus Signature
Bkav W32.AIDetectNet.01
Lionic Clean
Elastic malicious (high confidence)
MicroWorld-eScan IL:Trojan.MSILZilla.23825
FireEye IL:Trojan.MSILZilla.23825
CAT-QuickHeal Clean
ALYac IL:Trojan.MSILZilla.23825
Cylance Clean
Zillya Clean
Sangfor Clean
K7AntiVirus Clean
BitDefender IL:Trojan.MSILZilla.23825
K7GW Clean
Cybereason Clean
Baidu Clean
VirIT Clean
Cyren W32/MSIL_Kryptik.HBH.gen!Eldorado
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of MSIL/Filecoder.AQJ
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky VHO:Trojan-Ransom.Win32.Agent.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Clean
Ad-Aware IL:Trojan.MSILZilla.23825
TACHYON Clean
Comodo Clean
F-Secure Clean
DrWeb Clean
VIPRE IL:Trojan.MSILZilla.23825
TrendMicro Clean
McAfee-GW-Edition GenericRXUL-FZ!B4865C2D9F23
Trapmine Clean
CMC Clean
Emsisoft IL:Trojan.MSILZilla.23825 (B)
Ikarus Trojan-Spy.AgentTesla
GData IL:Trojan.MSILZilla.23825
Jiangmin Trojan.MSIL.anpuy
Webroot Clean
Google Detected
Avira HEUR/AGEN.1254007
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Arcabit IL:Trojan.MSILZilla.D5D11
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:MSIL/AgentTesla.ESL!MTB
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.AgentTesla.C5225381
Acronis Clean
McAfee GenericRXUL-FZ!B4865C2D9F23
MAX malware (ai score=80)
VBA32 Clean
Malwarebytes Malware.AI.3553588819
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
SentinelOne Static AI - Suspicious PE
MaxSecure Clean
Fortinet MSIL/Agent.EBS!tr.spy
BitDefenderTheta Gen:NN.ZemsilF.36158.hm0@aCQu5if
AVG Win32:RansomX-gen [Ransom]
Avast Win32:RansomX-gen [Ransom]
CrowdStrike win/malicious_confidence_90% (D)
No IRMA results available.