Static | ZeroBOX

PE Compile Time

2013-05-20 08:53:00

PE Imphash

17b7d61bda0f7478e36d9ce3d4170680

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00005e1c 0x00006000 6.40729011265
.rdata 0x00007000 0x00001354 0x00001400 5.03783442288
.data 0x00009000 0x000202d8 0x00000600 3.75873630878
.ndata 0x0002a000 0x00021000 0x00000000 0.0
.rsrc 0x0004b000 0x0001b550 0x0001b600 4.54883552869

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x00065768 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00065768 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00065768 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00065768 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00065768 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00065768 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_DIALOG 0x00065ed8 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x00065ed8 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x00065ed8 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x00065ed8 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x00065f38 0x0000005a LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x00065f98 0x00000204 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x000661a0 0x000003b0 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document, ASCII text, with very long lines, with no line terminators

Imports

Library KERNEL32.dll:
0x407060 CompareFileTime
0x407064 SearchPathW
0x407068 SetFileTime
0x40706c CloseHandle
0x407070 GetShortPathNameW
0x407074 MoveFileW
0x40707c GetFileAttributesW
0x407080 GetLastError
0x407084 GetFullPathNameW
0x407088 CreateDirectoryW
0x40708c Sleep
0x407090 GetTickCount
0x407094 CreateFileW
0x407098 GetFileSize
0x40709c GetModuleFileNameW
0x4070a0 GetCurrentProcess
0x4070a4 CopyFileW
0x4070a8 ExitProcess
0x4070b4 SetFileAttributesW
0x4070bc SetErrorMode
0x4070c0 LoadLibraryW
0x4070c4 lstrlenW
0x4070c8 lstrcpynW
0x4070cc GetDiskFreeSpaceW
0x4070d0 GlobalUnlock
0x4070d4 GlobalLock
0x4070d8 CreateThread
0x4070dc CreateProcessW
0x4070e0 RemoveDirectoryW
0x4070e4 lstrcmpiA
0x4070e8 GetTempFileNameW
0x4070ec lstrcpyA
0x4070f0 lstrcpyW
0x4070f4 lstrcatW
0x4070f8 GetSystemDirectoryW
0x4070fc GetVersion
0x407100 GetProcAddress
0x407104 LoadLibraryA
0x407108 GetModuleHandleA
0x40710c GetModuleHandleW
0x407110 lstrcmpiW
0x407114 lstrcmpW
0x407118 WaitForSingleObject
0x40711c GlobalFree
0x407120 GlobalAlloc
0x407124 LoadLibraryExW
0x407128 GetExitCodeProcess
0x40712c FreeLibrary
0x407134 GetCommandLineW
0x407138 GetTempPathW
0x407140 FindFirstFileW
0x407144 FindNextFileW
0x407148 DeleteFileW
0x40714c SetFilePointer
0x407150 MultiByteToWideChar
0x407154 FindClose
0x407158 MulDiv
0x40715c ReadFile
0x407160 WriteFile
0x407164 lstrlenA
0x407168 WideCharToMultiByte
Library USER32.dll:
0x40718c EndDialog
0x407190 ScreenToClient
0x407194 GetWindowRect
0x407198 RegisterClassW
0x40719c EnableMenuItem
0x4071a0 GetSystemMenu
0x4071a4 SetClassLongW
0x4071a8 IsWindowEnabled
0x4071ac SetWindowPos
0x4071b0 GetSysColor
0x4071b4 GetWindowLongW
0x4071b8 SetCursor
0x4071bc LoadCursorW
0x4071c0 CheckDlgButton
0x4071c4 GetMessagePos
0x4071c8 LoadBitmapW
0x4071cc CallWindowProcW
0x4071d0 IsWindowVisible
0x4071d4 CloseClipboard
0x4071d8 SetClipboardData
0x4071dc wsprintfW
0x4071e0 CreateWindowExW
0x4071e8 AppendMenuW
0x4071ec CreatePopupMenu
0x4071f0 GetSystemMetrics
0x4071f4 SetDlgItemTextW
0x4071f8 GetDlgItemTextW
0x4071fc MessageBoxIndirectW
0x407200 CharPrevW
0x407204 CharNextA
0x407208 wsprintfA
0x40720c DispatchMessageW
0x407210 PeekMessageW
0x407214 ReleaseDC
0x407218 EnableWindow
0x40721c InvalidateRect
0x407220 SendMessageW
0x407224 DefWindowProcW
0x407228 BeginPaint
0x40722c GetClientRect
0x407230 FillRect
0x407234 DrawTextW
0x407238 GetClassInfoW
0x40723c DialogBoxParamW
0x407240 CharNextW
0x407244 ExitWindowsEx
0x407248 DestroyWindow
0x40724c CreateDialogParamW
0x407250 SetTimer
0x407254 SetWindowTextW
0x407258 PostQuitMessage
0x40725c GetDC
0x407260 SetWindowLongW
0x407264 LoadImageW
0x407268 SendMessageTimeoutW
0x40726c FindWindowExW
0x407270 EmptyClipboard
0x407274 OpenClipboard
0x407278 TrackPopupMenu
0x40727c EndPaint
0x407280 ShowWindow
0x407284 GetDlgItem
0x407288 IsWindow
0x40728c SetForegroundWindow
Library GDI32.dll:
0x40703c SelectObject
0x407040 SetBkMode
0x407044 CreateFontIndirectW
0x407048 SetTextColor
0x40704c DeleteObject
0x407050 GetDeviceCaps
0x407054 CreateBrushIndirect
0x407058 SetBkColor
Library SHELL32.dll:
0x407178 SHBrowseForFolderW
0x40717c SHGetFileInfoW
0x407180 ShellExecuteW
0x407184 SHFileOperationW
Library ADVAPI32.dll:
0x407000 RegCloseKey
0x407004 RegOpenKeyExW
0x407008 RegDeleteKeyW
0x40700c RegDeleteValueW
0x407010 RegEnumValueW
0x407014 RegCreateKeyExW
0x407018 RegSetValueExW
0x40701c RegQueryValueExW
0x407020 RegEnumKeyW
Library COMCTL32.dll:
0x407028 ImageList_Create
0x40702c ImageList_AddMasked
0x407030 ImageList_Destroy
0x407034 None
Library ole32.dll:
0x4072a4 CoCreateInstance
0x4072a8 CoTaskMemFree
0x4072ac OleInitialize
0x4072b0 OleUninitialize
Library VERSION.dll:
0x407298 GetFileVersionInfoW
0x40729c VerQueryValueW

!This program cannot be run in DOS mode.
*jRichu
`.rdata
@.data
.ndata
SQSSSPW
Instu_
softuV
NulluM
SUVWj 3
@j"@^f
D$(UPU
WSWh`s@
D$$+D$
D$,+D$$P
PPPPPP
\u f9O
90u'AAf
MulDiv
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
SetFilePointer
MultiByteToWideChar
ReadFile
WriteFile
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsW
lstrcmpW
lstrcmpiW
CloseHandle
SetFileTime
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
GetLastError
CreateDirectoryW
SetFileAttributesW
GetTickCount
CreateFileW
GetFileSize
GetModuleFileNameW
GetCurrentProcess
CopyFileW
ExitProcess
SetEnvironmentVariableW
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
SetErrorMode
LoadLibraryW
lstrlenW
lstrcpynW
GetDiskFreeSpaceW
GlobalUnlock
GlobalLock
CreateThread
CreateProcessW
RemoveDirectoryW
lstrcmpiA
GetTempFileNameW
lstrcpyA
lstrcpyW
lstrcatW
GetSystemDirectoryW
GetVersion
GetProcAddress
LoadLibraryA
GetModuleHandleA
KERNEL32.dll
EndPaint
DrawTextW
FillRect
GetClientRect
BeginPaint
DefWindowProcW
SendMessageW
InvalidateRect
EnableWindow
ReleaseDC
LoadImageW
SetWindowLongW
GetDlgItem
IsWindow
FindWindowExW
SendMessageTimeoutW
wsprintfW
ShowWindow
SetForegroundWindow
PostQuitMessage
SetWindowTextW
SetTimer
CreateDialogParamW
DestroyWindow
ExitWindowsEx
CharNextW
DialogBoxParamW
GetClassInfoW
CreateWindowExW
SystemParametersInfoW
RegisterClassW
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetMessagePos
LoadBitmapW
CallWindowProcW
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuW
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharPrevW
CharNextA
wsprintfA
DispatchMessageW
PeekMessageW
USER32.dll
SelectObject
SetTextColor
SetBkMode
CreateFontIndirectW
CreateBrushIndirect
DeleteObject
GetDeviceCaps
SetBkColor
GDI32.dll
SHFileOperationW
ShellExecuteW
SHGetFileInfoW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHELL32.dll
RegEnumValueW
RegEnumKeyW
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
ADVAPI32.dll
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
COMCTL32.dll
CoCreateInstance
OleUninitialize
OleInitialize
CoTaskMemFree
ole32.dll
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VERSION.dll
SHGetFolderPathW
SHFOLDER
SHAutoComplete
SHLWAPI
GetUserDefaultUILanguage
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegDeleteKeyExW
ADVAPI32
MoveFileExW
GetDiskFreeSpaceExW
KERNEL32
[Rename]
%ls=%ls
|ahh(u
gv=~}6
-nw~7;
E,..bhh
!_(`yy
QPA@wl
a]@VWW
UX^^6w
|v~~^Zs
(FGG;bM7
EAww72
{7DQ4s
}[WVV~
J)4Ms\
"DQ4;%
100pc
Gww7dYFWW
VVV088hj
Zpb9oE
0XY`UU5;
.{SRJi
SSS^SR
dYF__
ILNNbvv
833sk[
0FGG_`
bzzzm5
}4MC:
/,,`yy
MMUUE0
SSSomyq
>A)};O%
0555RI
Xj:V=M
L_?O/N
"IRU*q+a
a6a3t"
0XXX@&
Cww74UC2
Ps]vcf
YF+$`U
U[Q7&`t
I"zjtt4
0>222g>
@KXcS
":JD'+
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="*" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v3.0a0</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="*" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/></application></compatibility></assembly>
NullsoftInst
B,:tCaD
VPv,;"#
^Ai!#w7
QF@\@OI
Lqow0g
;iiaLI
=6Qf(;p
!W"u{B
tlK~RIB
S_siV
&x~/^5
-7$U/[.
_E6f"W
0|i(Az
T3WH&_#
W$p]jH
Jj"{{G3
FnAj@?`hhHc
\_P$LA
ZT7i0.
7j_,^\
s$L5k#
of&VtOv
rHtRab
s^evpf
<_@t_a
';.2ei
4!#CB:g
r`P/>Y
!|yfV@xE
| ^R*4
H]ftF
SQ=a+C:q
M70.anv~[
lT6G>@
e:Ud="
XqQ}`*
?<MeKAe
pD_ExJl
=>A8Q~
(.D!-weI
|$=JgPW6c?
-=z_Rg
-5gvE
l[e"v$v
%[ ?4q
h8]Yv91]
h)e rq
mP)MRN-S
Dn>t~]
KEl>7<e
uEr1n#
Xc"|a
vSs7KDe
E_x-fu
j{N}K-
i>QjVF
j8q4oK
Y`wD#W
A 9Wos)
3{39p6R\G
:w.O95z>
dF0Mgn_
.,2?Z?QY
SL@5:n
hqJSUS
e.x`^ET
|_;J+F
pFEOW
],KJ 
1`[sxti
[kIaK5
8q\CW7
/6I37
B<b7Kf~
7I:>.h
E&}tVRXK
j"GoCg
>?hk#W
oB\@S7
y$G7v<E
lf2q(k.
x5||}g
5Oj;B
JeW\-O
&aTx2a
[QN'Gq9WqL
"r@ldRQn8
cbV\G]lx
-T,mGM
wd OZv
kYa_<5
wg=B/T
8umGtf
$D&v/o
eb'r;a
V=Of|^
s7Xxx5"
4c-~IgG
wch8P"@|
g<% s,
uC9`ZI%
Z:>j+K(
:G?Z3!
QZE``"GY
38g&waD
+%Z!V
GR2\)dg
*yyMm6R
_6ng[]
=MrbeH
rZ*Sh?
.TOQ>g
B$A.-
%I1&w*h#,f
Mx7@0[
s;vuga
&@*I5:
jaB-qb<
n1>:oF
H]k!!G
RJcS8'
t95HI<
N,<]Hl
cCk=i$
I*dOLM
w+Z#;q
A&]68=1
C6s)y$
WL`x`Y
$YqnUG
FI6GbN
qTi Uu
>6XAK
ZWu7mhcI
8S<??
3fk#b6
H~:UrS
w;e%WfW%
7t7d7a
7*"{Gq
g`KcnI[
mo"O!a=Z
\6pT*H
jgOYL
/rstjU,@m
vckz~VtI
"@\!RV
}'EN8B
e2R$9b
,xO{S%
O{lfQ
PVzp}T
=[nSHS
kXchrv}
~K@_>s
<WC\W~F<
D@^9kQ`
`UbmY$m0
tyE]E^
|T%&7G
>nyE3~=
%mEew/
,>|]4H
$];L^E
mf*]C<
2z[7H?`
A?3>zb
Ni@3Ab+Px
7W#-9M
_vE>}
$v08GX
7|0N;l
a"S|kC
nqdVFH>S
X g4/),
H&c$8{l>
4))FZ/G
J}c[JQ
YV33Mp
(g]H>
zT4(ae
X!-=>`
3whlOSB
Eii<-$*
a.,I%|<
Qh{Av&
;+ZO,I
/F=9/Z
65gjbZo
L)8"kJ
KZ?nS
^0EiP2
)kne^U
Dz.Flwvl
2DpFQH3
OKwwWm
|KD2aS/
t=+:-k
n-N7MM
KGHeV[
.vG?y}
y$)ii-1
L]L-;rY?
QvTVj#
TTzHZU
iw,vrT-
KEr[E*
I6~q~+TM
HtE!S+
\} IBA
8_Z,y%EdK
^(Ss~5
YO#&tI
u/&%hnf
`3=U{EJ
CNJMc{
XhhYS'
P.0'}(
t\N(PBR
.5OqJi
\Sb8lA
(:m&-]
FHXI&*
;%3Nd'
G(>5j
gX8vL
T5~5Qx
SNH\/B
wVjv%d
)+]b1L
^#oT|?
!^p?9g
5IParY
aEiU)p
<IVRN}
mfwyX:
St#t_s
^4hv]
vDg\7H
e1a\%K$.\
<5*N&.
!FweR5
X~&=0F
DVR8zt%
$9hkh
@=8`ga
0oB2#u
zP3{J;VX
?/HcOx
/A2BPrhk
r{3,Q(
GsESn/
sAP.*l
]QX728n
;h=]7n
b&eL""
HJ9f&%,
%&rTOI
q`24-i
a]Oa1?
LV)wA1
!\eNOn
T-S'C5
{TuYY[^
98\Q+;
K2|fRC
s]]JaM
9!u$1sNB
V]ihaqI0
-^$T:s
3{EG%"p
f#*l@fG
R>I&\A
rgHK8`
+S<D}{
xaPi:^
3<b4D_
O^;:yI
?5G:C2
u4A!}7
P1vRxj
>'BakDe
#Bp;k
!9jCT0]
!~?lk=H&
\e#lmW
<0VFo\
9A8JD"
9)I!d
z5N:_n
ggtrq$
]3&RD
bKAJ#v
=<#j"p
HM87UH
oRh+f
\bl!BZ
1!gwmF
wsY/PL
Ca>O/B
yl;F[+
zNuaipj
h)bc+^
/g>kQ?
;|koXk
PTf|Dfbd
',V|#M
~([3v_3
2l}>~VE
>RPu\.
pE{;W0
:J)BTqg
sBMUx$Q
{oJK]i
0_Gfg.&
*i?n//
ufK2%cn
-HB-<0
2?HEi5>}1
~yAm7.
.mhw!-g
K1{A+\{
zI.l=oJ
fN^fujS
.Kpxwp
<J-:c@{
-@=Qgl
>k" mR
Xq.W_g
*G+Oa} L
1>@2K/xAZ
bm9Hbo/2
kt*_7?
u1Y4BR
wO:ppN
Y>N2*T
S!{TPT.
l 0B!E>
)1k[@:
z.a%|-
:4Uo8b >V
j"=@=u
U<zEDCU
&m2{x^s
A1ZL*,]
Khw4}4&I
rPIW>3qY
mIn+zm
"TQKo)
EE]=D6~hw
3>{5dP
i*dk(-
-{S-D"T:
$.Fh(>
[X0G|.l
HK~RC>P
M.ZC?E
3sgW/J
~N YIf
fj}Y,+}
kGoaXMe
-NuFo
}e9&&n
$P{krfA
a*/c#Xi
gTqC-^
Pwi/1!0
\qBBf@
Pw fu/
peL/hxro
8Vb[/R.X=
gM|u"-t,LI(
79g04my
f$@m1/
jyV9YUbk
r#^M-Q
6]*4FN
9Pb.#z
(OiIF+
upfVOC
Iy2=!pG
5%5hKeY,
4sKCdsa
;;0Ttj
u!fZ`
3]?G:J
"sjb)t
]$h#~4
q<`^T'
e!^ROQ
ldFdnS
v$|Ks'
T:a{K0
u]XJR2G
&zLMjW
"&JU"\
yGCna?y
G]P2Tz
{]=5O9W
+Dm8*/#
phVIGC
cY{-l9c
X*.t4
z#A@S
k0i {=
J2A5GW`
Fg0cL;
@B\dKX
uXLLQ(
;FFbW(
# fUZ]
{G,-JI
SytN/0
P/f{4:;IQ'
o{9GSGDa*
p;;rB0
]VSE}t
=zv^s2
EliJ/@
[9%=,N
.LbzQ_
CVPI+
`<<x+D[6
-8;1MAO_4@
$_ qT
f!F%p;
j[CKAn
4sUsX{
O~H)qO
NK2%*]
rhGM>l
'=&erW
+*w6$ b
$I6`9:E
M9#oir
zgEF=M
LxDvVU
*pa0?r
"^D^)?G
SH}Bgb
bgFzbm
#x'2ZQ
K*[B])
8qs?-r&
{)wuA.
-hpGRQo
IjhZ~(
xl~YO
YcUEf^7
RichEdit
RichEdit20A
RichEd32
RichEd20
.DEFAULT\Control Panel\International
Control Panel\Desktop\ResourceLocale
Software\Microsoft\Windows\CurrentVersion
\Microsoft\Internet Explorer\Quick Launch
verifying installer: %d%%
unpacking data: %d%%
... %d%%
Installer integrity check has failed. Common causes include
incomplete download and damaged media. Contact the
installer's author to obtain a new copy.
More information at:
http://nsis.sf.net/NSIS_Error
Error writing temporary file. Make sure your temp folder is valid.
Error launching installer
SeShutdownPrivilege
~nsu.tmp
NSIS Error
%u.%u%s%s
*?|<>/":
MS Shell Dlg
MS Shell Dlg
msctls_progress32
SysListView32
MS Shell Dlg
MS Shell Dlg
VS_VERSION_INFO
StringFileInfo
040904e4
Comments
Allegoriserede pantachromatic Ekshibitionismen
FileVersion
1.1.0.0
ProductName
Sliber biporose Baake
ProductVersion
1.1.0.0
VarFileInfo
Translation
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Clean
tehtris Clean
MicroWorld-eScan Gen:Variant.Nemesis.25214
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
McAfee Artemis!109DBD7130E7
Cylance Clean
VIPRE Gen:Variant.Nemesis.25214
Sangfor Clean
CrowdStrike win/malicious_confidence_70% (W)
BitDefender Gen:Variant.Nemesis.25214
K7GW Trojan ( 005903451 )
K7AntiVirus Trojan ( 005903451 )
BitDefenderTheta Clean
VirIT Clean
Cyren W32/Injector.IXZN-5720
Symantec Trojan.Gen.MBT
Elastic malicious (high confidence)
ESET-NOD32 NSIS/Injector.ASH
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.Win32.Makoob.gen
Alibaba Clean
SUPERAntiSpyware Clean
Rising Clean
Sophos Clean
Baidu Clean
F-Secure Clean
DrWeb Trojan.Loader.1597
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.BadFile.fc
Trapmine Clean
FireEye Gen:Variant.Nemesis.25214
Emsisoft Gen:Variant.Nemesis.25214 (B)
Ikarus Trojan.NSIS.Agent
GData Gen:Variant.Nemesis.25214
Jiangmin Clean
Webroot Clean
Avira Clean
MAX malware (ai score=80)
Antiy-AVL Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Nemesis.D627E
ViRobot Clean
ZoneAlarm HEUR:Trojan.Win32.Makoob.gen
Microsoft Trojan:Win32/Wacatac.B!ml
Google Detected
AhnLab-V3 Downloader/Win.GuLoader.C5451771
Acronis Clean
VBA32 Clean
ALYac Clean
TACHYON Clean
DeepInstinct Clean
Malwarebytes Trojan.Crypt
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Trojan.Igent.b0ttLZ.23
SentinelOne Clean
MaxSecure Clean
Fortinet Clean
AVG Win32:Evo-gen [Trj]
Avast Win32:Evo-gen [Trj]
No IRMA results available.