Static | ZeroBOX

PE Compile Time

2023-03-20 06:49:06

PE Imphash

23ab51c15380bcf81a5cee1a5c0399b5

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000c058 0x0000c200 6.70064619331
.rdata 0x0000e000 0x00002de4 0x00002e00 6.16766348864
.data 0x00011000 0x0002dffc 0x0002d400 6.98364904351
.rsrc 0x0003f000 0x00000658 0x00000800 3.33604377328
.reloc 0x00040000 0x00001a9e 0x00001c00 4.40992812959

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0003f200 0x00000454 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x0003f0a0 0x0000015a LANG_ENGLISH SUBLANG_ENGLISH_US ASCII text, with CRLF line terminators

Imports

Library KERNEL32.dll:
0x40e008 FreeConsole
0x40e00c GetVersion
0x40e010 GetSystemInfo
0x40e014 MultiByteToWideChar
0x40e018 GetModuleHandleA
0x40e01c GetProcAddress
0x40e020 GetCommandLineA
0x40e028 GetModuleHandleW
0x40e02c Sleep
0x40e030 ExitProcess
0x40e034 WriteFile
0x40e038 GetStdHandle
0x40e03c GetModuleFileNameA
0x40e04c WideCharToMultiByte
0x40e050 GetLastError
0x40e058 SetHandleCount
0x40e05c GetFileType
0x40e060 GetStartupInfoA
0x40e068 TlsGetValue
0x40e06c TlsAlloc
0x40e070 TlsSetValue
0x40e074 TlsFree
0x40e07c SetLastError
0x40e080 GetCurrentThreadId
0x40e088 HeapCreate
0x40e08c VirtualFree
0x40e090 HeapFree
0x40e098 GetTickCount
0x40e09c GetCurrentProcessId
0x40e0a4 HeapAlloc
0x40e0a8 RaiseException
0x40e0ac GetCPInfo
0x40e0b0 GetACP
0x40e0b4 GetOEMCP
0x40e0b8 IsValidCodePage
0x40e0bc TerminateProcess
0x40e0c0 GetCurrentProcess
0x40e0c8 IsDebuggerPresent
0x40e0d4 LoadLibraryA
0x40e0dc VirtualAlloc
0x40e0e0 HeapReAlloc
0x40e0e4 RtlUnwind
0x40e0e8 HeapSize
0x40e0ec LCMapStringA
0x40e0f0 LCMapStringW
0x40e0f4 GetStringTypeA
0x40e0f8 GetStringTypeW
0x40e0fc GetLocaleInfoA
Library GDI32.dll:
0x40e000 SetBkColor

!This program cannot be run in DOS mode.
u9Richs
`.rdata
@.data
@.reloc
_VVVVV
^WWWWW
>=Yt1j
j@j ^V
0A@@Ju
0SSSSS
0SSSSS
_VVVVV
0SSSSS
0SSSSS
URPQQhH
t"SS9]
PPPPPPPP
PPPPPPPP
<+t(<-t$:
+t HHt
;t$,v-
UQPXY]Y[
t+WWVPV
bad allocation
VirtualProtect
kernel32.dll
OZOFea3D3I3etJb0LNZFAu4ykNaUlJm4nbrdCwdOicvThBTuW8a4OItWziBKjpdjl
KLB4AuJd5BWIOwrqZsMZHiDOH2mIhdSE6AFhTsLqp03Sig0Ck98XBeWLqxgor0D1e
zYbNxQba2I1kXLrwiVUVzA8TNSJ08xmMWYG8RpnhdXdplEQKWBSYclWbr5iF4Xzmg
^)I&]iZ
^[<1]|
^Cu=]:
5It]4]
;L]XsO]n
^!v=](
^m`5]R(
^*Z]]9
\d"#\1
^m?^b
V\A1-]
Q]`LQ]A
[fKG]WB
E\uh1]
^bad allocation
GAIsProcessorFeaturePresent
KERNEL32
CorExitProcess
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
Unknown exception
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
1#QNAN
1#SNAN
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
GetProcAddress
GetModuleHandleA
MultiByteToWideChar
FreeConsole
GetVersion
GetSystemInfo
KERNEL32.dll
SetBkColor
GDI32.dll
GetCommandLineA
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapAlloc
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSectionAndSpinCount
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
" -F
<-_
:-_
.*(6[
V&4 ur
/*#Oy
W<=%L6
1#0$:!
B"T$~?H
fc!W$c
f!57$D
3%e6%
E7` 2$
<djmAI
gEq_iD
uM`rAB
eCqiON
2a49bf
nIqTYP
aYLnIT
nT62 t
_sqaTI
gEq_iD
2bGAec
cawrAY
INlttY
rRdyiN
4 cdFG
iTQyPE
INlttY
rA|INI
_ia6 i
sEq_iD
aTlcaR
vAqeiM
4f=8fb
FRjmjs
TeA_ci
AUqhdA
lEftIO
>LZ_IN
yT`spE
BAfkIN
kIkgfI
nGCiEL
FI`lD
rYutED
TO@nD
d vdFM
WHltEs
MOae S
fS`tmO
gEq_uN
ENaINV
pOvaBL
HAkdLE
dUie G
oM`GET
oM`GET
DAqetI
tIjnsC
VAiuEt
e BeTt
WH`rE
uLquRE
BAve i
uLqiCA
_SqaTE
eDDtTR
bL|TIT
eWjrKa
bUqe o
e DsSE
MEhbER
tRdcTa
cTDtTR
tTwiBU
uNqiME
e VaVE
_mdxrE
AUqhtA
pLdysI
g BeTe
g CiLE
rIkg g
WIatH
_mdxjS
sEktAT
LAgeL
tcmaNN
eAaeRs
iTmm h
eSvTHA
oWvVER
hEktIC
UNlcAS
SEwiAL
cTloN
lL`cTI
PaadRE
togjEC
tIjn S
cEutIO
eSfrIP
COhpAR
aDaiNG
tv`rSI
mB`r g
HEddER
tIjnpR
afjlDE
oFq.cs
cH`r f
nVlrON
fOMeLP
td`lEG
REvoLV
aNdgEM
nUheRA
uM`rAB
GRdpHI
ccdrDS
rVlcES
eTZCHI
uAbeS
IpLnTE
rIdbLE
rDraRE
_ukiCA
MIkuTE
iCdldR
FLdgS
aSveDp
gEq_tI
eTZCRE
aNkeLS
mAlnS
re}pRE
iOks s
uNqiME
sT`mpA
eTZADD
xIvtS
gEheNT
bk`yoB
t VyST
LIhiT
nCWeSU
leieME
nVlrON
.cjlLE
nS+IeN
eTZCOU
cElvEt
t VyST
iL`ASt
gEGoX
FRjmbA
mENeY
yPqoGR
eL`cTm
eTZFAC
edlrEC
DIweCT
lIqy s
eCprIT
tiaeNT
rIguTE
lIfKEY
tIjn!<
tAilER
iOk cO
aM`wOR
bFpsCA
aTloN!
mEvpAC
iT|&!
ENqiTY
sSloNm
ENqiTY
eDZkEY
|S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<hs393r3
S6<{s39^r3
yS6<zs39\r3
S6<{s39[r3
S6<{s39^r3
S6<{s39^r3
s39^r3
S6<{s39^r3
S6<{s39^r3
{S6<{s39
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39]r3
S6<{s39^r3
S6<{s39^r3
{S6<ys39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39]r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
|S6<{s39^r3
S6<{s39^r3
s39^r3
S6<{s39^r3
`S6<{s39]r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
s39^r3
s39{r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
s39^r3
S6<qs39
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39\r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<ys39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
}S6<{s39^r3
S6<ys39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
}S6<{s39pr3
S6<{s39^r3
S6<{s39^r3
]v6= v
S6<{s39^r3
S6<{s39_r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
s39^r3
S6<{s39^r3
S6<{s39Zr3
0S6<6s39^r3
S6<{s39^r3
~v6= v
S6<{s39^r3
S6<{s39^r3
s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
{S6<{s39
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
~S6<{s39
S6<xs39\r3
cS6<{s39]r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<ys39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
|S6<zs39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39]r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39^r3
S6<{s39]r3
S6<{s39^r3
S6<{s39^r3
S6<ys39Zr3
7Z~y@%
mBiyiD
uRk:SC
xEfuTI
.?AVbad_alloc@std@@
.?AVexception@std@@
.?AVtype_info@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
3!3*363C3L3U3a3n3w3
44,454>4J4W4`4i4r4{4
5'535@5I5R5[5d5p5}5
6)626;6D6M6Y6f6o6x6
7$7-767B7O7X7a7m7z7
88+888A8J8V8c8l8u8
9!9*939?9L9U9^9j9w9
9 :,:8:J:W:c:o:
;&;3;?;K;T;];i;v;
<"<+<4<@<L<^<k<w<
=(=:=G=S=_=k=w=
>.>;>G>S>e>r>~>
?)?6???H?T?a?j?s?
0$000B0O0[0g0y0
1$161C1O1[1m1z1
22(212=2J2S2\2h2u2~2
3.3;3G3S3e3r3~3
4#4,454A4N4W4`4l4y4
5*575@5I5U5b5k5t5
6+686D6P6b6o6{6
77,787D7V7c7o7{7
8 8)828>8K8T8]8i8v8
9'949=9F9R9_9h9q9}9
:):5:A:S:`:l:x:
;1;L;Q;_;k;w;
<.<;<G<S<e<r<~<
=)=6=?=H=T=a=j=s=
>$>0>B>O>[>g>y>
?$?6?C?O?[?m?z?
0*070C0O0a0n0z0
11(111=1J1S1\1h1u1~1
2 2,2>2K2W2c2u2
3&333<3E3Q3^3g3p3|3
4H4X4v4%8D8I8O8S8Y8]8c8g8m8q8v8|8
8/9H9O9W9\9`9d9
9>:D:H:L:P:
;;;m;t;x;|;
;G<l<}<
=I=N=U=[=
=$>W>]>e>r>
< =&=;=D=q=
=#>+>>>I>N>^>h>o>z>
>7?D?n?s?~?
R0_0|0
3L4W4a4r4}406A6I6O6T6Z6
8*8K8Q8
8"9,9T9m9
9B:H:k:p:
;6;<;G;S;h;o;
<'<.<F<U<\<i<
=7===Y=q=
>4>>>v>~>
??&?+?3?<?H?M?R?X?\?b?g?m?r?
070g0l0z0
7&979q9~9
=,=H=Q=W=`=e=t=
2$2+2C2
8$8(8,8084888<8@8
;F<`=W>i>
?'?3?:?D?n?|?
162;2@2E2U2
2#3(3/343;3@3
3H4W4f4o4
5#5)585>5M5S5a5j5y5~5
8$8]8f8r8
8B;P;V;p;u;
<"<*<0<:<A<U<\<b<p<w<|<
;J<W>i>{>
5h6^7f7
9<:B:R:
2 2$212
3$333_3
3X;^;d;j;p;v;};
<#<)</<E<L<
3F3L3X3
5'5[5a5m5
; ;.;^;
@0F0J0O0
@2D2H2L2P2T2X2\2`2d2h2l2p2t2x2|2
3 3$3(3,3034383<3@3D3H3L3P3T3X3\3`3d3h3l3p3t3x3|3
4 4$4(404H4L4d4t4x4
5 5$5,5@5H5\5t5x5
6(6H6h6
7$7(7H7d7h7
4 4$4(4,4044484<4@4D4H4T4\4d4l4t4|4
5d5h5l5
;(;8;H;X;|;
;P>`>d>h>l>p>t>x>|>
? ?(?,?0?4?8?<?@?D?H?L?X?
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
210429000000Z
360428235959Z0i1
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
[K]taM?
SA|X=G
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
jj@0HK4
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
220429000000Z
240501235959Z0
Delaware1
Private Organization1
27481291
San Jose1
Adobe Inc.1
Acrobat 111
Adobe Inc.0
->`}\"
US-DELAWARE-27481290
Mhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Mhttp://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
http://www.digicert.com/CPS0
http://ocsp.digicert.com0\
Phttp://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
>"kWGItY
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
{y1~0V
20230303081113Z
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
220921000000Z
331121235959Z0F1
DigiCert1$0"
DigiCert Timestamp 2022 - 20
Ihttp://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
http://ocsp.digicert.com0X
Lhttp://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
(f*^[0
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
220323000000Z
370322235959Z0c1
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
DigiCert Inc1
www.digicert.com1$0"
DigiCert Assured ID Root CA0
220801000000Z
311109235959Z0b1
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
]J<0"0i3
v=Y]Bv
http://ocsp.digicert.com0C
7http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
4http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
~qj#k"
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA
230303081113Z0+
/1(0&0$0"
mscoree.dll
KERNEL32.DLL
((((( H
h(((( H
H
AxAXA8A
VS_VERSION_INFO
StringFileInfo
040904E4
Comments
Headache uncorrelated ween institutionally
CompanyName
France decrees sextet
FileDescription
Unplugged pictographic annal asteroid caftans peace
FileVersion
8.154.57.7
InternalName
Garishly
LegalCopyright
Copyright
Hearse ceases displeased crocodile floats
LegalTrademarks
Adjustments textbook
OriginalFilename
Incapacitating tendril
ProductName
Deflects supportive
ProductVersion
8.154.57.7
VarFileInfo
Translation
BAdobe Acrobat Reader DC Installe
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.Convagent.4!c
tehtris Clean
DrWeb Trojan.PWS.Siggen3.28526
MicroWorld-eScan Gen:Variant.Fragtor.234085
FireEye Gen:Variant.Fragtor.234085
CAT-QuickHeal Clean
McAfee Artemis!3DB6D94B8DF4
Cylance unsafe
Zillya Clean
Sangfor Trojan.Win32.Kryptik.V8k2
K7AntiVirus Clean
BitDefender Gen:Variant.Fragtor.234085
K7GW Clean
BitDefenderTheta Gen:NN.ZexaE.36344.qu2@aiIzsQei
VirIT Clean
Cyren W32/Kryptik.JFM.gen!Eldorado
Symantec Trojan Horse
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Kryptik.HTCD
APEX Clean
Paloalto generic.ml
ClamAV Clean
Kaspersky HEUR:Trojan-Spy.Win32.Stealer.gen
Alibaba Trojan:Win32/Kryptik.1ef7e3c3
NANO-Antivirus Clean
ViRobot Trojan.Win.Z.Fragtor.267768.E
Rising Trojan.Kryptik!8.8 (TFE:5:fK4e4rRai8M)
Emsisoft Gen:Variant.Fragtor.234085 (B)
F-Secure Trojan.TR/AD.RedLineSteal.otvog
Baidu Clean
VIPRE Gen:Variant.Fragtor.234085
TrendMicro TrojanSpy.Win32.REDLINE.YXDCTZ
McAfee-GW-Edition Artemis!Trojan
Trapmine malicious.high.ml.score
CMC Clean
Sophos Mal/Generic-S
SentinelOne Static AI - Suspicious PE
GData Gen:Variant.Fragtor.234085
Jiangmin Clean
Webroot Clean
Google Detected
Avira TR/AD.RedLineSteal.otvog
MAX malware (ai score=83)
Antiy-AVL Trojan/Win32.Kryptik
Gridinsoft Malware.Win32.RedLine.bot
Xcitium Malware@#w7vshkzta1l
Arcabit Trojan.Fragtor.D39265
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-Spy.Win32.Stealer.gen
Microsoft Trojan:Win32/Redline.CAC!MTB
Cynet Malicious (score: 99)
AhnLab-V3 Trojan/Win.Generic.C5397075
Acronis Clean
VBA32 Clean
ALYac Gen:Variant.Fragtor.234085
TACHYON Clean
Malwarebytes Trojan.Crypt
Panda Clean
Zoner Clean
TrendMicro-HouseCall TrojanSpy.Win32.REDLINE.YXDCTZ
Tencent Clean
Yandex Clean
Ikarus Trojan.Win32.Crypt
MaxSecure Clean
Fortinet PossibleThreat.PALLASNET.H
AVG Win32:CrypterX-gen [Trj]
Avast Win32:CrypterX-gen [Trj]
No IRMA results available.