Static | ZeroBOX

PE Compile Time

2022-06-11 18:59:29

PDB Path

C:\buzaku76-jepogikah_mexuweguyija\31\jixowu-91\zokito45\wezonoyedo.pdb

PE Imphash

0c473655039a754e9f814d9a583e5330

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00029b1e 0x00029c00 7.80249242356
.data 0x0002b000 0x0006da18 0x00002400 1.19677280133
.rsrc 0x00099000 0x0000b210 0x0000b400 4.67642038213
.reloc 0x000a5000 0x000019b4 0x00001a00 3.16758923994

Resources

Name Offset Size Language Sub-language File type
RT_CURSOR 0x000a3368 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x000a3368 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x000a3368 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x000a3368 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x000a3368 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x000a3368 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x000a3368 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_CURSOR 0x000a3368 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009f848 0x00000468 LANG_SPANISH SUBLANG_SPANISH_BOLIVIA GLS_BINARY_LSB_FIRST
RT_ICON 0x0009f848 0x00000468 LANG_SPANISH SUBLANG_SPANISH_BOLIVIA GLS_BINARY_LSB_FIRST
RT_ICON 0x0009f848 0x00000468 LANG_SPANISH SUBLANG_SPANISH_BOLIVIA GLS_BINARY_LSB_FIRST
RT_ICON 0x0009f848 0x00000468 LANG_SPANISH SUBLANG_SPANISH_BOLIVIA GLS_BINARY_LSB_FIRST
RT_ICON 0x0009f848 0x00000468 LANG_SPANISH SUBLANG_SPANISH_BOLIVIA GLS_BINARY_LSB_FIRST
RT_ICON 0x0009f848 0x00000468 LANG_SPANISH SUBLANG_SPANISH_BOLIVIA GLS_BINARY_LSB_FIRST
RT_ICON 0x0009f848 0x00000468 LANG_SPANISH SUBLANG_SPANISH_BOLIVIA GLS_BINARY_LSB_FIRST
RT_ICON 0x0009f848 0x00000468 LANG_SPANISH SUBLANG_SPANISH_BOLIVIA GLS_BINARY_LSB_FIRST
RT_STRING 0x000a3d88 0x00000484 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_STRING 0x000a3d88 0x00000484 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x000a38d0 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x000a38d0 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x000a38d0 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x0009fcb0 0x00000076 LANG_SPANISH SUBLANG_SPANISH_BOLIVIA data
RT_VERSION 0x000a3900 0x000001d8 LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library KERNEL32.dll:
0x40100c WaitNamedPipeA
0x401014 GetUserDefaultLCID
0x40101c AddConsoleAliasW
0x401020 GetModuleHandleW
0x401024 EnumCalendarInfoExW
0x401028 ReadConsoleW
0x40102c EnumResourceTypesA
0x401030 TlsSetValue
0x401034 FindResourceExA
0x401038 LoadLibraryW
0x40103c GetVersionExW
0x401044 GetFileAttributesA
0x401048 SetConsoleMode
0x40104c GetConsoleAliasW
0x401054 GetMailslotInfo
0x40105c GetStringTypeExA
0x401060 CreateJobObjectA
0x401064 GetProfileIntA
0x401068 GetCPInfoExW
0x40106c GetLastError
0x401074 GetProcAddress
0x401078 VirtualAlloc
0x40107c HeapSize
0x401080 BackupWrite
0x401088 RemoveDirectoryA
0x40108c SetStdHandle
0x401090 LocalAlloc
0x401094 MoveFileA
0x401098 AddAtomW
0x4010a0 FoldStringA
0x4010a4 GetModuleHandleA
0x4010ac VirtualProtect
0x4010b0 OpenEventW
0x4010b8 GetShortPathNameW
0x4010bc GetVersionExA
0x4010c4 DeleteFileW
0x4010cc DebugBreak
0x4010d0 GetCommState
0x4010d8 VerSetConditionMask
0x4010e4 HeapFree
0x4010e8 MultiByteToWideChar
0x4010ec GetCommandLineA
0x4010f0 GetStartupInfoA
0x4010f4 Sleep
0x4010f8 ExitProcess
0x4010fc WriteFile
0x401100 GetStdHandle
0x401104 GetModuleFileNameA
0x401108 TerminateProcess
0x40110c GetCurrentProcess
0x401110 IsDebuggerPresent
0x401114 HeapAlloc
0x401118 HeapCreate
0x40111c VirtualFree
0x40112c HeapReAlloc
0x401130 GetCPInfo
0x401138 GetACP
0x40113c GetOEMCP
0x401140 IsValidCodePage
0x401144 TlsGetValue
0x401148 TlsAlloc
0x40114c TlsFree
0x401150 SetLastError
0x401154 GetCurrentThreadId
0x401160 WideCharToMultiByte
0x401168 SetHandleCount
0x40116c GetFileType
0x401174 GetTickCount
0x401178 GetCurrentProcessId
0x401180 RtlUnwind
0x401184 RaiseException
0x401188 LoadLibraryA
0x401190 LCMapStringA
0x401194 LCMapStringW
0x401198 GetStringTypeA
0x40119c GetStringTypeW
0x4011a0 GetLocaleInfoA
Library USER32.dll:
0x4011a8 CharLowerBuffW
Library GDI32.dll:
0x401000 SelectPalette
0x401004 GetCharWidthI

!This program cannot be run in DOS mode.
RA+uRNy
RA+dRzy
RA+jR^y
RA+tR^y
RA+qR^y
RRich_y
`.data
@.reloc
bad allocation
Unknown exception
bad exception
CorExitProcess
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
bad allocation
xibafudekazepahijelupiwufag
vucubugiwovu
bad exception
ribegifuxisucomavihudiliwihil
C:\buzaku76-jepogikah_mexuweguyija\31\jixowu-91\zokito45\wezonoyedo.pdb
D$(3D$
D$<)D$
D$ Pj@QR
D$D|n_6
D$H,:E+
D$(1}:
D$tDw
|*SSQVj
HtHu4j
s[S;7|G;w
tR99u2
0SSSSS
0A@@Ju
>=Yt1j
j@j ^V
QQSVWd
0SSSSS
0SSSSS
URPQQh
t"SS9]
PPPPPPPP
PPPPPPPP
;t$,v-
UQPXY]Y[
t+WWVPV
ndQhE#S
x.:"s=
(\&Gb._
_f_Yw]
OnO)P!
#Mf 6e)
[O6J6rI{t
gQ(V{g$#j
f lQAw
'Hw1%N2
n.HTV`
5{ou~~
Z0BGh^
OoWjc?
Z}!{f
A>,$-
D2WTA}
6ToOn)
XZ"q~w
o[nTp8
5vxh%p
Rk%d:{
s?g(`
S6?Jm0
H@bB0[|
_w:xd#l
,pnjNOl
p#^1{kPd
uH^D8=
<UaS|K
D2I 0^
yJ;W u
G&s+OKn
|P4:/
cXsV+\\
NlS,P/s
E\NDxf
'VlXmM
a`A>.g
W7*k])
1V"ZR
`NTy)d
gp^9L 3
innx7L%
v(`tZ-
i:JWgT
zteKFsY
7@@Oq.:'$9.n
sS*l8R
DKN_J^
P}Uo^u$
Zk4|>1z
i<d}AC
e!8omVC<
cPN6P
~py<JA#
Rs<q>[
*|B0)}8
mRKAP
D~Y,Sf
iY-%f7
KRe Hr
<\8>K3
DX!?J2
PvJj'2S
f8Y75<K
^i8u2'
<6%D(_
0TW;dox5
R2CgC[
h[oyYO
B1/a.O'
ZxHk#_
.}5<oQ
5.aObN
:t sb
'.6M_a/
9(BV`j[
1|t:^:==
3c/u[GQgMi
!u[Mi'
q&&t`'
tk<aFP!
g~Tq&z
P';xp5
uT>MAoq$\
le[;gP
wOnyJf
*:zhYYd=
_v#8;ul
7U)mEH:
z4??PV
LW%gnX
H)Us(?
@^Acm$,\
Dr#v4b{q
Nk2sPYJI
j$9/1R
BtA>4"8
{upgz8
zdQ\K0
NCwU1U
;.!E=8y}
A)H 0u:;
HUsV37
|@oiGr^j
tJ\EN
u=M$fN
y`"K5u1p
J;gF`%
Up/exx
Z140p
Ew|B'^%
<6O-_}3
t**B7y2
'"+Mt!
dv1&}(JN
l*)D"\
kdji|C
DCBp2'
pe\?D@W
3w;lGA
)'!32A=0
;V5:^
kmfQM5
AXrT*-OS
eZp*U
mHCD<:
L`s|Yc
+1cZc1
WlJn>{
`8w\$r
rCI|G^V%,
N$hCF:
QEJv]J
g^_V%$
B!$3zR!
C;f1A,oqa
u(U&v:
Q4;1*g
O@QMPN
x"7bhBV0y
O~a%cp
Ws&a.b
[D^3z`yh
oggrm|
wkZPKB
%Q>zz%!
:#ycSZ
:0{0Nm
O;R+CN.
fibej',Ul+
2;\Htp
s<^VG_
$\/RE
qnGaq.dN;I
myU,3i2\
aXTAN#:
GPqBtA
[C>M^`v0y
?X6LDb
"YP<j
I(uaM<
TWjd%F
z0;"xN
$8wgkf
0Gj6Tu
PHVS&!
f1@42H
]B@Sjs_
mai^DV
6^R$[R
8e%*V
-5(VRs
FD@.+Js
eLBgGc
CxB{d,
~podWm
*r;CbF
>Qc{"!
'it?dd
}Sw6sQ
|&m%4T
;_Wp[VA
+IB4cTiW
{)n?#lt
]anwy:
NpFbn=
0*0r%/J
~R\?9zz
VE0PP{C
BvsMrb
Dd'hNW
`vZ^r%
J._U0VL"
t`5QH/
%UyVAf
-sA(~ue
~TW:?%
G79LXX=
VpYau(
|#dG,
K_)yHN
2IqL|ZB
QO<?3Q|"
f7}tjf
PG."s5
VerSetConditionMask
GetCommState
InterlockedDecrement
WaitNamedPipeA
SetFirmwareEnvironmentVariableA
GetUserDefaultLCID
InterlockedCompareExchange
AddConsoleAliasW
GetModuleHandleW
EnumCalendarInfoExW
ReadConsoleW
EnumResourceTypesA
TlsSetValue
FindResourceExA
LoadLibraryW
GetVersionExW
DeleteVolumeMountPointW
GetFileAttributesA
SetConsoleMode
GetConsoleAliasW
SetConsoleCursorPosition
GetMailslotInfo
WritePrivateProfileStringW
GetStringTypeExA
CreateJobObjectA
GetProfileIntA
GetCPInfoExW
GetLastError
InterlockedFlushSList
GetProcAddress
VirtualAlloc
HeapSize
BackupWrite
WriteProfileSectionA
RemoveDirectoryA
SetStdHandle
LocalAlloc
MoveFileA
AddAtomW
BeginUpdateResourceA
FoldStringA
GetModuleHandleA
FreeEnvironmentStringsW
VirtualProtect
OpenEventW
QueryPerformanceFrequency
GetShortPathNameW
GetVersionExA
GetWindowsDirectoryW
DeleteFileW
GetConsoleProcessList
DebugBreak
KERNEL32.dll
CharLowerBuffW
USER32.dll
SelectPalette
GetCharWidthI
GDI32.dll
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsFree
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
LoadLibraryA
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
.?AVtype_info@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVbad_exception@std@@
|K@:z@j
.?AVexception@std@@
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
44444444444444444444444444444444444444
''''''''
''''''
'''''''''''
''''''
'''''''''
'''''''
''''''''''
''''''''
FM''''''''''
''''''
'''''''
'''''''
''''''
444444
''''''4
4444444
4444444444
44444444444
444444444
44444444444444
444444444444
JJJJJJJJJJJ&
GGGGGGGGGGGGGGGGGGGGGGGG
xxxW99
Z???-V
Z???-V
xxx999
Z???-)
Z????)DP
XGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG
XXXXXXXXXXXXXX
7777777X
XXXXXXD
XXXXXXX
XXXXXXu
***cccccccccccccccccc*****ciiiiii
c****ciii
c****ciii
c****ciiii
c****c.iiii>
c****c..iii
c****c...iii
c****c.....i
c****c.....i
c****c......
c****c.......
ic****c........
>ic****c
y;****^0
y****^00
****hhhhhhhhhhhhhh
p*********************
***************************************************************************************************
~~~[[9e29
~~~~[oeG29
~~~~~[oe5^9
~~~~~~~
11AAAAAAAAA9e#
e#G91A
Me#o11AAAAAAAAAAA
9111111111111111111111111111111111
~zz}z{
{{z||}
~}{~|{
{~~{{{
|}||y|
~}~}}|~~
{}|zz~
|~~~~}|
||~{{}
|z{}{y}
|~~}}||
|~|{z{
~~~zzz{
|}{y|}
~}|~}||}
~|y~|z
{~{{|||
}|~{}z
~}|}~}z
z}z|}{~y}|
z|{}}}|
{~|yz~
iiiiiiii
iiiiiiii
iiiiii
iiiiii
iiiiiiiii
iiiiiiiiii
iiiiiiii
iiiiiii
iiiiiiiii



2 2$2<2@2D2H2L2P2H:L:
(9,9094989<9@9D9H9L9P9T9X9\9`9d9h9l9p9t9x9|9
: :$:(:,:0:4:8:<:@:D:H:L:P:T:X:\:`:d:h:l:p:t:x:|:
:$<(<0<4<8<<<
=$=(=,=4=L=\=`=h=
0"0(0.040B0g0o0}0
1191X1z1
1D2J2~2
3B3G3M3\3h3n3t3z3
4#4?4i8o8u8
99$9I9]9q9x9
8G9L9V9
808<8D8T8i8
:c:h:m:r:
;P;U;\;a;h;m;
>2>R>h>z>L?V?c?~?
1;1L1B2G2U2b2i2s2
4Y6g6m6
7#7)74797A7G7Q7X7l7s7y7
0$0<0T0
101v1|1
4N4[4e4s4|4
8%8.848=8B8Q8x8
<#<7<><e<k<v<
='=-=9=?=L=V=]=u=
=6><>f>l>
>@?c?m?
0&0,03090@0F0N0U0Z0b0k0w0|0
1$1D1J1f1
51585<5@5D5H5L5P5T5
6!6<6C6H6L6P6q6
6:7@7D7H7L7
9Q:^:g:
:K;V;`;q;|;/=@=H=N=S=Y=
?)?J?P?
!0+0S0l0
0A1G1j1o1
272?2K2
3C4[4`4
8?8X8_8g8l8p8t8
9N9T9X9\9`9
:!:K:}:
<H=M=_=}=
>$>->B>r>
1#1/1[1i1o1
3.444:4@4F4L4S4Z4a4h4o4v4}4
5"5*5E5Q5]6
;"</>A>S>u>
=,=0=@=d=p=x=
>(>0>D>`>
? ?@?`?l?
000L0P0l0p0
0,000D0L0T0\0d0l0t0|0
8 909@9P9`9
9 :$:(:,:0:4:8:<:@:D:H:L:P:T:X:\:`:d:h:l:p:t:x:|:
; ;$;(;,;0;4;@;
mscoree.dll
KERNEL32.DLL
((((( H
h(((( H
H
ditewanexanixirid sutapabujeravunohe
kernel32.dll
wujobi
msimg32.dll
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
/ P6pL
,/KPip
/-P?pR
VS_VERSION_INFO
StringFileInfo
045801F2
FilesVersion
40.84.7.79
InternalName
TravelTimes
LegalCopyright
Copyright (C) 2023, maersk
ProductName
Blabus
VarFileInfo
Translation
Muwa baviv loduhibipu xogop gux$Cacop yixi fecijuzesunuz rega molozu/Nohokih fotabuh jigijamacuro cosalezo noyol zaw
Tipoguvucokotud cojugitasix@Witeluyizef deroni vazodiruxe rehux jajudugoveyuw tolocuhowiyadi
Higus powebay wupenupalego
Nez giyovuleragif!Hakot mabasovi honuvorene lafesez/Xupiminuyaxofe ricakujixe nuw puciyig wipulikoj
Nubofi lecoxe sulipa masasaki
Dalojeso yirufemojakifuk(Balimomugecular lasuyudabe resekohizehet
Bud vusitifixudun>Repibariwe vezijop rucajovutorecum husebifatalado bukihohafate
Cadiza debac bokbYirehasug putaviyaxopifo memineya woxizamumeperu vufiti tunay vuwagile rucepikezayal patagaligujub6Penoyojim cimosowuta tilax wesabakaxinixit zeyu wujaba
RutekuxavatamaFYiluyimobota wevaz pucunadokumasex dileyugubigu mafene bazowibuwasugovNJorifox rojagazafib kanucu fewexopicel sineguhemuruxuy vapire miveju vezinucic
3Rugozuxaluguja xiwevinef pukazomesepifal jaxexoxevu
Cebipoxop
Antivirus Signature
Bkav W32.AIDetectNet.01
Lionic Trojan.Win32.Strab.4!c
tehtris Clean
MicroWorld-eScan Trojan.GenericKD.66303522
ClamAV Win.Packer.pkr_ce1a-9980177-0
FireEye Generic.mg.6809ca52cdc1bfff
CAT-QuickHeal Ransom.Stop.P5
McAfee Artemis!6809CA52CDC1
Cylance unsafe
VIPRE Trojan.GenericKD.66303522
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Trojan.GenericKD.66303522
K7GW Trojan ( 005a22c91 )
K7AntiVirus Trojan ( 005a22c91 )
Arcabit Trojan.Generic.D3F3B622
Baidu Clean
VirIT Clean
Cyren W32/ABRisk.TTQR-0746
Symantec Trojan Horse
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Kryptik.HTGR
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.Win32.Nymaim.gen
Alibaba Trojan:Win32/Nymaim.9568d18a
NANO-Antivirus Clean
ViRobot Trojan.Win.Z.Strab.233984
Rising Stealer.Agent!8.C2 (TFE:5:ShT7KaHqUTS)
Sophos Mal/Generic-S
F-Secure Clean
DrWeb Trojan.PWS.Stealer.33898
Zillya Clean
TrendMicro Trojan.Win32.AMADEY.YXDDGZ
McAfee-GW-Edition BehavesLike.Win32.Lockbit.dc
Trapmine malicious.moderate.ml.score
CMC Clean
Emsisoft Trojan.GenericKD.66303522 (B)
SentinelOne Static AI - Suspicious PE
Jiangmin Clean
Webroot W32.Malware.Gen
Avira Clean
MAX malware (ai score=89)
Antiy-AVL Trojan/Win32.RedLine
Gridinsoft Trojan.Win32.Gen.bot
Xcitium Malware@#3ckvmizau7aaz
Microsoft Trojan:Win32/Casdet!rfn
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan.Win32.Nymaim.gen
GData Trojan.GenericKD.66303522
Google Detected
AhnLab-V3 Trojan/Win.TrojanX-gen.R568324
Acronis suspicious
BitDefenderTheta Clean
ALYac Trojan.GenericKD.66303522
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Malware-Cryptor.2LA.gen
Malwarebytes Trojan.MalPack.GS
Panda Clean
Zoner Clean
TrendMicro-HouseCall Trojan.Win32.AMADEY.YXDDGZ
Tencent Win32.Trojan.Nymaim.Edhl
Yandex Clean
Ikarus Trojan-Ransom.StopCrypt
MaxSecure Trojan.Malware.300983.susgen
Fortinet PossibleThreat.ZDS
AVG Win32:BotX-gen [Trj]
Avast Win32:BotX-gen [Trj]
No IRMA results available.