Static | ZeroBOX

PE Compile Time

2068-11-29 17:11:37

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00014e24 0x00015000 5.57824134477
.rsrc 0x00018000 0x0000c034 0x0000c200 4.07980362781
.reloc 0x00026000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0002348c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0002348c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0002348c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0002348c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0002348c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0002348c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0002348c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0002348c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x000238f4 0x00000076 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x0002396c 0x000004dc LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x00023e48 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
9rF>B
9rF>;
q,aW;
lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
PADPADP
!1!%)+../
397,8(-:+
-+--+--+-++--+-+----------++-+---+----+8+7-----7++
Oi%.[v
RJQjQiJ2M4
${u\]cfk
l[#2[j+
HD>A[
D'Q-(->'
|\Rtqa
J*]{kg
v4.0.30319
#Strings
b7cwQ0
<>c__DisplayClass0_0
<>9__3_0
<SelfDestructInit>b__3_0
<>9__4_0
<Main>b__4_0
<>c__DisplayClass4_0
<>c__DisplayClass6_0
<>9__7_0
<Start>b__7_0
<ProcessCommands>b__0
<ProcessUrls>b__0
v5ala0
<ProcessCommand>g__HandleData|0
<>c__DisplayClass0_1
<>9__3_1
<SelfDestructInit>b__3_1
<>9__4_1
<Main>b__4_1
<>c__DisplayClass4_1
<>c__DisplayClass6_1
IEnumerable`1
List`1
CS$<>8__locals1
Microsoft.Win32
ReadInt32
ToInt32
lz0c92
_4PTQrgiyh7cZ2
Dictionary`2
cKvN73
nivib3
_HVhTT1ZBOv8r3
set_ContentLength64
ojtdc4
get__rQCu5kL9aERg4
set__rQCu5kL9aERg4
_eSSAr0BJd2in4
vQy255
kbjNm5
get__2oCM1NqbYPlW7
set__2oCM1NqbYPlW7
get__MtD4bkSqiAoe7
set__MtD4bkSqiAoe7
get_UTF8
sc7_Q9
hqjQmA
get__1LcF6IEaz174B
set__1LcF6IEaz174B
get__lIsYXNPZPt68C
set__lIsYXNPZPt68C
pAvGiC
gnABkC
_6pb20rLYJKPgD
_kWeftOWxUeHnE
ziObeF
l9ZDEG
jIKWEH
get_ASCII
tw8NxI
y0AeeK
aEik_L
oC7xtN
System.IO
nZwodO
_5BSfBvbGOtMgO
lFowhO
gLMucQ
mxhMqQ
i16vlR
_k20TVtjJxqudS
_3unBQttbwa22T
iYGxUT
_UaINXLH7d336U
_sW7VOrwJlVBDU
gLglkU
_Z0atP8Z6sZrbV
du2ByV
_DPp1b69Q5i4lW
iqRnwX
nzaYMY
wUnThY
get__alu0ynRJfj90Z
set__alu0ynRJfj90Z
get__PHHUbAO9V8R2Z
set__PHHUbAO9V8R2Z
get__lja9POhrsJkvZ
set__lja9POhrsJkvZ
t0wgY_
__User32_SendMessage__
__Kernel32_GetModuleHandle__
get_Data
cbData
pbData
DownloadData
UploadData
GetData
mscorlib
DataBlob
get__UNJzB0sSIQnrb
set__UNJzB0sSIQnrb
uCMdWc
System.Collections.Generic
get_Id
dwThreadId
ProcessId
GetProcessById
idThread
add_DomainUnload
add_ErrorDataReceived
add_OutputDataReceived
pReserved
Synchronized
ReadToEnd
command
Append
get_HttpMethod
method
Clipboard
pNRFbe
Replace
get_AvailableFreeSpace
get_beaconService
set_beaconService
wScanCode
get_ExitCode
keyCode
CompressionMode
FromImage
get_Message
AddRange
EndInvoke
BeginInvoke
IDisposable
ToDouble
RuntimeTypeHandle
GetTypeFromHandle
Rectangle
DownloadFile
IsInRole
WindowsBuiltInRole
Console
hModule
get_MainModule
ProcessModule
dwStyle
set_WindowStyle
ProcessWindowStyle
get_Name
sProcName
get_FileName
set_FileName
GetTempFileName
sFileName
GetFileName
get_ModuleName
lpModuleName
get_MachineName
get_FullName
get_UserName
browserName
get_ProcessName
lpszWindowName
GetProcessesByName
GetDirectoryName
DateTime
get_LastWriteTime
get_CreationTime
BeginErrorReadLine
BeginOutputReadLine
AppendLine
WriteLine
get_NewLine
Combine
LocalMachine
ValueType
get_DriveType
SecurityProtocolType
uMapType
get_Culture
set_Culture
get__LyqMqnIrYuPse
set__LyqMqnIrYuPse
ReadOnlyCollectionBase
ApplicationSettingsBase
get_Response
HttpListenerResponse
response
Dispose
TryParse
MulticastDelegate
DebuggerBrowsableState
EditorBrowsableState
SetApartmentState
lpKeyState
Delete
STAThreadAttribute
CompilerGeneratedAttribute
GuidAttribute
GeneratedCodeAttribute
DebuggerNonUserCodeAttribute
DebuggableAttribute
DebuggerBrowsableAttribute
EditorBrowsableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
XmlTypeAttribute
XmlAttributeAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
XmlEnumAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
UnmanagedFunctionPointerAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
XmlRootAttribute
XmlArrayAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
set_UseShellExecute
ToByte
GetValue
Remove
get_Size
cbSize
Serialize
Deserialize
get__CEscviAN6TfNf
set__CEscviAN6TfNf
SizeOf
IndexOf
cchBuff
pwszBuff
get__y4ZbdDDuaDYnf
set__y4ZbdDDuaDYnf
_RnExqLUJnbAYg
cHKfcg
get_Jpeg
get_Png
System.Threading
Encoding
System.Drawing.Imaging
get_IsListening
System.Runtime.Versioning
FromBase64String
ToBase64String
DownloadString
FromXmlString
ToString
GetString
Substring
System.Drawing
shit.jpg
v_1yrg
_iFssFaVu140ih
get_LocalPath
GetTempPath
GetFolderPath
get_Width
nWidth
get_Length
EndsWith
StartsWith
vyyAPi
swgiZi
r4T9Cj
a4PCSj
dOvSlj
jA23mj
gMIK4k
AsyncCallback
callback
idHook
AllocHGlobal
FreeHGlobal
Marshal
System.Security.Principal
WindowsPrincipal
System.ComponentModel
kernel32.dll
System.Xml
set_SecurityProtocol
sQFurl
t1gUDm
GZipStream
get_InputStream
get_OutputStream
MemoryStream
lParam
wParam
get_Item
set_Item
OperatingSystem
_u8cjtNRCaxJgm
AsymmetricAlgorithm
vhLbkm
Random
TimeSpan
CopyFromScreen
AppDomain
get_CurrentDomain
GetFileNameWithoutExtension
get_OSVersion
System.IO.Compression
Application
get_Location
System.Configuration
System.Globalization
System.Xml.Serialization
System.Reflection
ProcessModuleCollection
ManagementObjectCollection
HttpListenerPrefixCollection
KeyCollection
CallingConvention
IOException
WebException
add_UnhandledException
pszDescription
ri3zDo
get__zJQ0pqxlnKMSo
set__zJQ0pqxlnKMSo
CopyTo
Ixpuaoptpsmnpthtakcsbo
FileInfo
CultureInfo
DriveInfo
FileSystemInfo
set_StartInfo
ProcessStartInfo
DirectoryInfo
eBEvno
Bitmap
hwndApp
glX6Pq
hBtUrq
ToChar
StringReader
StreamReader
TextReader
RSACryptoServiceProvider
RNGCryptoServiceProvider
StringBuilder
SpecialFolder
sender
Buffer
get_ResourceManager
ServicePointManager
ManagementObjectSearcher
DataReceivedEventHandler
UnhandledExceptionEventHandler
System.CodeDom.Compiler
HttpListener
ToUpper
CurrentUser
StringWriter
TextWriter
GetDelegateForFunctionPointer
ToLower
XmlSerializer
set_RedirectStandardError
IEnumerator
ManagementObjectEnumerator
GetEnumerator
RandomNumberGenerator
.cctor
IntPtr
qk_fFs
uQeoKs
zYedXs
qlWZbs
Graphics
System.Diagnostics
get_TotalSeconds
GetBounds
System.Runtime.InteropServices
System.Runtime.CompilerServices
System.Resources
_1ph7suTHxm14t.Properties.Resources.resources
DebuggingModes
GetDirectories
ExpandEnvironmentVariables
GetFiles
get_Modules
GetSubKeyNames
GetProcesses
ReadAllBytes
WriteAllBytes
GetBytes
GetDrives
get_Prefixes
dwPromptFlags
dwFlags
DataReceivedEventArgs
UnhandledExceptionEventArgs
System.Windows.Forms
Contains
System.Collections
get_Chars
GetCurrentProcess
GetProcAddress
DataFormats
set_Arguments
get_Exists
get_Keys
gmv4Gt
Concat
AppendFormat
ImageFormat
Subtract
IDataObject
GetDataObject
ManagementBaseObject
get_ExceptionObject
ManagementObject
object
Collect
CryptprotectPromptstruct
System.Net
get_Height
nHeight
op_Explicit
WaitForExit
add_ProcessExit
get_Default
IAsyncResult
result
WebClient
System.Management
Environment
hwndParent
get_Current
GetCurrent
get_Count
GetPathRoot
pPrompt
szPrompt
Encrypt
ThreadStart
Convert
uigQst
get_Request
HttpListenerRequest
set_RedirectStandardOutput
MoveNext
System.Text
ReadAllText
AppendAllText
WriteAllText
pPlainText
pCipherText
HttpListenerContext
GetContext
wSZclv
get_UtcNow
set_CreateNoWindow
get__Bj8E1F2HUWjKy
set__Bj8E1F2HUWjKy
y4x6Oy
ToArray
ToCharArray
get_IsReady
OpenSubKey
ContainsKey
wVirtKey
RegistryKey
System.Security.Cryptography
get_Assembly
GetExecutingAssembly
GetEntryAssembly
set_IsReadOnly
BlockCopy
pEntropy
LoadLibrary
FreeLibrary
ObjectQuery
SelectQuery
CreateDirectory
get_SystemDirectory
GetCurrentDirectory
SetCurrentDirectory
get_RootDirectory
Registry
get_Capacity
op_Equality
op_Inequality
WindowsIdentity
IsNullOrEmpty
r_rzTz
WrapNonExceptionThrows
a23123
esrf3wr
534sdf
234sdf
423sdfq121
234sdf3w
$abdfc253-c89f-448c-882e-6fbff9561938
123.342.123.33
.NETFramework,Version=v4.7.2
FrameworkDisplayName
.NET Framework 4.7.2
3System.Resources.Tools.StronglyTypedResourceBuilder
17.0.0.0
KMicrosoft.VisualStudio.Editors.SettingsDesigner.SettingsSingleFileGenerator
17.5.0.0
command
Commands
commands
filename
filedata
filesize
createdDate
modifiedDate
information
report
_CorExeMain
mscoree.dll
oecyxd
Q6}H`{{d
2V~.Ih
4P&py
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
GlobalSign Root CA - R31
GlobalSign1
GlobalSign0
160615000000Z
240615000000Z0Z1
GlobalSign nv-sa100.
'GlobalSign CodeSigning CA - SHA256 - G30
<paX7
"http://ocsp2.globalsign.com/rootr306
%http://crl.globalsign.com/root-r3.crl0c
&https://www.globalsign.com/repository/0
JEe-MI
GlobalSign nv-sa100.
'GlobalSign CodeSigning CA - SHA256 - G30
200825134207Z
230826134207Z0]1
Berlin1
Berlin1
win.rar GmbH1
win.rar GmbH0
Z>Jjv%
<http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
,http://ocsp2.globalsign.com/gscodesignsha2g30V
&https://www.globalsign.com/repository/0
.http://crl.globalsign.com/gscodesignsha2g3.crl0
%%2~,1Dog%y
DigiCert Inc1
www.digicert.com1$0"
DigiCert Assured ID Root CA0
220801000000Z
311109235959Z0b1
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
]J<0"0i3
v=Y]Bv
http://ocsp.digicert.com0C
7http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
4http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
~qj#k"
(f*^[0
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
220323000000Z
370322235959Z0c1
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
220921000000Z
331121235959Z0F1
DigiCert1$0"
DigiCert Timestamp 2022 - 20
Ihttp://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
http://ocsp.digicert.com0X
Lhttp://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
GlobalSign nv-sa100.
'GlobalSign CodeSigning CA - SHA256 - G3
Y&5I~ms"
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA
230220094054Z0/
GlobalSign Root CA - R31
GlobalSign1
GlobalSign0
160615000000Z
240615000000Z0Z1
GlobalSign nv-sa100.
'GlobalSign CodeSigning CA - SHA256 - G30
<paX7
"http://ocsp2.globalsign.com/rootr306
%http://crl.globalsign.com/root-r3.crl0c
&https://www.globalsign.com/repository/0
JEe-MI
GlobalSign nv-sa100.
'GlobalSign CodeSigning CA - SHA256 - G30
200825134207Z
230826134207Z0]1
Berlin1
Berlin1
win.rar GmbH1
win.rar GmbH0
Z>Jjv%
<http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
,http://ocsp2.globalsign.com/gscodesignsha2g30V
&https://www.globalsign.com/repository/0
.http://crl.globalsign.com/gscodesignsha2g3.crl0
%%2~,1Dog%y
GlobalSign nv-sa100.
'GlobalSign CodeSigning CA - SHA256 - G3
20230220094054Z0
GlobalSign nv-sa1)0'
Globalsign TSA for Advanced - G4
GlobalSign nv-sa110/
(GlobalSign Timestamping CA - SHA384 - G40
220406074412Z
330508074412Z0S1
GlobalSign nv-sa1)0'
Globalsign TSA for Advanced - G40
RgqC7
zkld4F
&https://www.globalsign.com/repository/0
-http://ocsp.globalsign.com/ca/gstsacasha384g40C
7http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
0http://crl.globalsign.com/ca/gstsacasha384g4.crl0
1VR(K_
.@]|Gt0
GlobalSign Root CA - R61
GlobalSign1
GlobalSign0
180620000000Z
341210000000Z0[1
GlobalSign nv-sa110/
(GlobalSign Timestamping CA - SHA384 - G40
a:c|9#ymt
"http://ocsp2.globalsign.com/rootr606
%http://crl.globalsign.com/root-r6.crl0G
&https://www.globalsign.com/repository/0
$KtZ}r
GlobalSign Root CA - R31
GlobalSign1
GlobalSign0
190220000000Z
290318100000Z0L1 0
GlobalSign Root CA - R61
GlobalSign1
GlobalSign0
PmBf/M
'YLv9[
"http://ocsp2.globalsign.com/rootr306
%http://crl.globalsign.com/root-r3.crl0G
&https://www.globalsign.com/repository/0
GlobalSign Root CA - R31
GlobalSign1
GlobalSign0
090318100000Z
290318100000Z0L1 0
GlobalSign Root CA - R31
GlobalSign1
GlobalSign0
,3:;%
GlobalSign nv-sa110/
(GlobalSign Timestamping CA - SHA384 - G4
GlobalSign nv-sa110/
(GlobalSign Timestamping CA - SHA384 - G4
gfKPJ
%$&$'$($43657598
&DzFRfUlUDv
vU~DLfJ|]SvBjS&
(l\$vKSM
Dc2Bt|
qwFEfngNSh
S//!>''F@
JF?v9HDb`
&Z^->
;%BSF``
MER\REZV
52=~Cnpxj^phy}Bpp~~Tq~}
7#>oHlb`d_ry
gIzctmW
*DNB@b
WHfK_YIpJG\_|TPWS}I
-L!RJv
6HCjTr\]wRh@_}It@_
XFY_D[GNW_SZC@@W^L[ARY
q_KwTeDVoW}^UsZqHT
9+9~Ebk~j[}oguR}qxvPuo
&-&IU}kgKTcm`]BdwgEIhanKB
J]}r_^KdoUC\fq\HBjq
#=ArDxx
HYjyRDXt}LD@k~XJF}x
1?4~Yjzv}Xt~ujGurju@uq|tNu
:5'VBap`YC|uy^]zoe]TtygT]
CIayZAH
yBA^tp\@_
<9BW@yxMV]{xVJ\~gIIXr{H@_
m38Z;?
p7!"BS4c
3L,zV8Y
j8m-:J40N
Q#9+!m"
;/"|%2;
6=o'#'EO
%%GK91
v%?QAS
7N1`h\K
T;&_K}6%
] !_6i
VVVKy##R>
A}x{nEqq}h
JICVAUK
ZZDZNIW1
^E[BI^/&>+
^E[BI^/&>+
JI@ZOK
ESEILD
OZ@UUN
ESFILD
VPISIW
VPISIW
ESFILD
OZ@UUN
OZ@UUN
ESFILD
JICZOK
OZ@UUN
LU_PFM
L+>1?%9#27?
$("XC+8
LU_PFM
L+>1?%9#274,!
JIFZOK
F"8-&/0%../
ESGILD
LU[PFM
ESGILD
-8)!D^
OZAUUN
JIBZOK
OZAUUN
IN'+4%; 77>'7]-
ESGILD
JNXR7!
VPISIW
JIBZOK
JIBZOK
F04(=-?#EMGNKD
OZAUUN
ESGILD
OZAUUN
LU[PFM
VPMSIW
IGNHTMGNHTMGNHTMG-]
LU[PFM
OZAUUN
LU[PFM
VPHSIW
LU[PFM
VPHSIW
LU[PFM
LU[PFM
OZAUUN
Z'&;MX
ESGILD
OZAUUN
LU[PFM
LU[PFM
ESDILD
ESDILD
JIAZOK
LUXPFM
LUXPFM
ESGILD
X(qXh
GPr)WG
< MBC}
s4!0*t1*=%y:/: b'0';g 5,6hGPG[
5 JPHh!T
<B}XJ=\"
@3()DX%
c3R9\.D
#RCG \ks
661S:Z
<.<(!P
=(R44(o
_z}$uEz;x0U;ni"[L
xEu8G=U4mV/[C
YP}ZICP;
hGVVWeFIIU|YCV]e_KH
0vR?6/v
vRF);#
50JHO!&
0OLQRwxH
v'/,mv0:[m
=5(u2:PN
xv!8zxg
%4 /1"QFJ4$>!J%_X-5
03bad55
,xv,$-&4
(_>4*U!
$5"7'Gdcc
:"45X#
/DVG/:
)#}l+ ;
r%u4=b?
.!/y,D5
<:={T;6#2T!,y,E5
+"k,Q+8-*
=(`x78$1?l87Q*)/=
.)lv_v
iAKTKi
F=[~ZW<
V{{G_DteW@Fmz]
Unknown
9375CFF0413111d3B88A00104B2A6676
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
c8a104e81ac80bfd7c55eb0c49c6ba60f
CompanyName
bfc57e2758c8c3b15e3629e8784955a4819
FileDescription
a6c18fca7c4041b9e0ac7
FileVersion
11.54.48.100
InternalName
Sccc3ee993b5afcb0ceb0faf02cba420a8d6b.exe
LegalCopyright
B88dc3130b6869f49380e01b664c212a6c20d1b
LegalTrademarks
u2b44bec696f3e09d1bd187ba05942769
OriginalFilename
Aaa478b50961ea50a3e34152d5e4c.exe
ProductName
q19625d9c370369c200ef2ccd3d851b4913aabb
ProductVersion
100.72.46.7
Assembly Version
33.16.43.59
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.Coins.4!c
tehtris Clean
MicroWorld-eScan Gen:Trojan.Mardom.IN.24
ClamAV Clean
FireEye Generic.mg.f693e2f2661b6e58
CAT-QuickHeal Clean
ALYac Gen:Trojan.Mardom.IN.24
Malwarebytes Malware.AI.3955527614
Zillya Clean
Sangfor Spyware.Msil.Coins.Vjti
K7AntiVirus Spyware ( 005a42b11 )
BitDefender Gen:Trojan.Mardom.IN.24
K7GW Spyware ( 005a42b11 )
CrowdStrike win/malicious_confidence_100% (W)
Baidu Clean
VirIT Clean
Cyren W32/ABRisk.OGCD-7620
Symantec ML.Attribute.HighConfidence
Elastic Clean
ESET-NOD32 a variant of MSIL/Spy.WhiteSnake.C
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 99)
Kaspersky HEUR:Trojan-PSW.MSIL.Coins.gen
Alibaba TrojanPSW:MSIL/Coins.f0da804a
NANO-Antivirus Clean
ViRobot Trojan.Win.Z.Mardom.155224
Tencent Win32.Trojan.FalseSign.Qcnw
Emsisoft Gen:Trojan.Mardom.IN.24 (B)
F-Secure Trojan.TR/PSW.Coins.fadtn
DrWeb Clean
VIPRE Gen:Trojan.Mardom.IN.24
TrendMicro TROJ_GEN.R03BC0XF723
McAfee-GW-Edition Artemis!Trojan
Trapmine Clean
CMC Clean
Sophos Mal/Generic-S
SentinelOne Static AI - Suspicious PE
GData Gen:Trojan.Mardom.IN.24
Jiangmin Clean
Webroot W32.Trojan.Gen
Avira TR/PSW.Coins.fadtn
MAX malware (ai score=88)
Antiy-AVL Trojan[PSW]/MSIL.Coins
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Mardom.IN.24
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-PSW.MSIL.Coins.gen
Microsoft Trojan:Win32/Woreflint.A!cl
Google Detected
AhnLab-V3 Trojan/Win.Mardom.C5421911
Acronis Clean
McAfee Artemis!F693E2F2661B
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Clean
Cylance unsafe
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R03BC0XF723
Rising Spyware.WhiteSnake!8.17C86 (CLOUD)
Yandex Clean
Ikarus Win32.Outbreak
MaxSecure Trojan.Malware.73700917.susgen
Fortinet PossibleThreat.ZDS
BitDefenderTheta Gen:NN.ZemsilF.36250.jm2@auwGsim
AVG Win32:SpywareX-gen [Trj]
Cybereason malicious.ca70e2
Avast Win32:SpywareX-gen [Trj]
No IRMA results available.