Static | ZeroBOX

PE Compile Time

2020-08-01 11:43:48

PE Imphash

ea4e67a31ace1a72683a99b80cf37830

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000623c 0x00006400 6.40257705324
.rdata 0x00008000 0x00001274 0x00001400 5.05749598324
.data 0x0000a000 0x0001a858 0x00000600 4.08975001509
.ndata 0x00025000 0x00010000 0x00000000 0.0
.rsrc 0x00035000 0x00027808 0x00027a00 3.84315179964

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0005bcb0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0005bcb0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0005bcb0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0005bcb0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0005bcb0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0005bcb0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0005bcb0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_DIALOG 0x0005c400 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x0005c400 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x0005c400 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x0005c400 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x0005c460 0x00000068 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x0005c4c8 0x00000340 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document, ASCII text, with very long lines, with no line terminators

Imports

Library ADVAPI32.dll:
0x408000 RegCreateKeyExA
0x408004 RegEnumKeyA
0x408008 RegQueryValueExA
0x40800c RegSetValueExA
0x408010 RegCloseKey
0x408014 RegDeleteValueA
0x408018 RegDeleteKeyA
0x408024 OpenProcessToken
0x408028 SetFileSecurityA
0x40802c RegOpenKeyExA
0x408030 RegEnumValueA
Library SHELL32.dll:
0x40816c SHGetFileInfoA
0x408170 SHFileOperationA
0x408178 ShellExecuteExA
0x408180 SHBrowseForFolderA
Library ole32.dll:
0x408284 IIDFromString
0x408288 OleInitialize
0x40828c OleUninitialize
0x408290 CoCreateInstance
0x408294 CoTaskMemFree
Library COMCTL32.dll:
0x408038 None
0x40803c ImageList_Create
0x408040 ImageList_Destroy
0x408044 ImageList_AddMasked
Library USER32.dll:
0x408188 SetClipboardData
0x40818c CharPrevA
0x408190 CallWindowProcA
0x408194 PeekMessageA
0x408198 DispatchMessageA
0x40819c MessageBoxIndirectA
0x4081a0 GetDlgItemTextA
0x4081a4 SetDlgItemTextA
0x4081a8 GetSystemMetrics
0x4081ac CreatePopupMenu
0x4081b0 AppendMenuA
0x4081b4 TrackPopupMenu
0x4081b8 FillRect
0x4081bc EmptyClipboard
0x4081c0 LoadCursorA
0x4081c4 GetMessagePos
0x4081c8 CheckDlgButton
0x4081cc GetSysColor
0x4081d0 SetCursor
0x4081d4 GetWindowLongA
0x4081d8 SetClassLongA
0x4081dc SetWindowPos
0x4081e0 IsWindowEnabled
0x4081e4 GetWindowRect
0x4081e8 GetSystemMenu
0x4081ec EnableMenuItem
0x4081f0 RegisterClassA
0x4081f4 ScreenToClient
0x4081f8 EndDialog
0x4081fc GetClassInfoA
0x408204 CreateWindowExA
0x408208 ExitWindowsEx
0x40820c DialogBoxParamA
0x408210 CharNextA
0x408214 SetTimer
0x408218 DestroyWindow
0x40821c CreateDialogParamA
0x408220 SetForegroundWindow
0x408224 SetWindowTextA
0x408228 PostQuitMessage
0x40822c SendMessageTimeoutA
0x408230 ShowWindow
0x408234 wsprintfA
0x408238 GetDlgItem
0x40823c FindWindowExA
0x408240 IsWindow
0x408244 GetDC
0x408248 SetWindowLongA
0x40824c LoadImageA
0x408250 InvalidateRect
0x408254 ReleaseDC
0x408258 EnableWindow
0x40825c BeginPaint
0x408260 SendMessageA
0x408264 DefWindowProcA
0x408268 DrawTextA
0x40826c GetClientRect
0x408270 EndPaint
0x408274 IsWindowVisible
0x408278 CloseClipboard
0x40827c OpenClipboard
Library GDI32.dll:
0x40804c SetBkMode
0x408050 SetBkColor
0x408054 GetDeviceCaps
0x408058 CreateFontIndirectA
0x40805c CreateBrushIndirect
0x408060 DeleteObject
0x408064 SetTextColor
0x408068 SelectObject
Library KERNEL32.dll:
0x408070 GetExitCodeProcess
0x408074 WaitForSingleObject
0x408078 GetProcAddress
0x40807c GetSystemDirectoryA
0x408080 WideCharToMultiByte
0x408084 MoveFileExA
0x408088 GetTempFileNameA
0x40808c RemoveDirectoryA
0x408090 WriteFile
0x408094 CreateDirectoryA
0x408098 GetLastError
0x40809c CreateProcessA
0x4080a0 GlobalLock
0x4080a4 GlobalUnlock
0x4080a8 CreateThread
0x4080ac lstrcpynA
0x4080b0 SetErrorMode
0x4080b4 GetDiskFreeSpaceA
0x4080b8 lstrlenA
0x4080bc GetCommandLineA
0x4080c0 GetVersion
0x4080cc GetTempPathA
0x4080d0 CopyFileA
0x4080d4 GetCurrentProcess
0x4080d8 ExitProcess
0x4080dc GetModuleFileNameA
0x4080e0 GetFileSize
0x4080e4 ReadFile
0x4080e8 GetTickCount
0x4080ec Sleep
0x4080f0 CreateFileA
0x4080f4 GetFileAttributesA
0x4080fc SetFileAttributesA
0x408100 GetFullPathNameA
0x408104 GetShortPathNameA
0x408108 MoveFileA
0x40810c CompareFileTime
0x408110 SetFileTime
0x408114 SearchPathA
0x408118 lstrcmpiA
0x40811c lstrcmpA
0x408120 CloseHandle
0x408124 GlobalFree
0x408128 GlobalAlloc
0x408130 LoadLibraryExA
0x408134 FreeLibrary
0x408138 lstrcpyA
0x40813c lstrcatA
0x408140 FindClose
0x408144 MultiByteToWideChar
0x408150 SetFilePointer
0x408154 GetModuleHandleA
0x408158 FindNextFileA
0x40815c FindFirstFileA
0x408160 DeleteFileA
0x408164 MulDiv

!This program cannot be run in DOS mode.
`.rdata
@.data
.ndata
vX95HGB
Instu`
softuW
NulluN
D$(SPS
Vj%SSS
D$$+D$
D$,+D$$P
SSSSjn
<v"Ph
UXTHEME
USERENV
SETUPAPI
APPHELP
PROPSYS
DWMAPI
CRYPTBASE
OLEACC
CLBCATQ
NTMARTA
RichEdit
RichEdit20A
RichEd32
RichEd20
.DEFAULT\Control Panel\International
Control Panel\Desktop\ResourceLocale
Software\Microsoft\Windows\CurrentVersion
\Microsoft\Internet Explorer\Quick Launch
RegEnumValueA
RegEnumKeyA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
SetFileSecurityA
RegOpenKeyExA
RegCreateKeyExA
ADVAPI32.dll
SHFileOperationA
SHGetFileInfoA
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteExA
SHGetSpecialFolderLocation
SHELL32.dll
CoTaskMemFree
CoCreateInstance
OleUninitialize
OleInitialize
IIDFromString
ole32.dll
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
COMCTL32.dll
EndPaint
DrawTextA
FillRect
GetClientRect
BeginPaint
DefWindowProcA
SendMessageA
InvalidateRect
EnableWindow
ReleaseDC
LoadImageA
SetWindowLongA
GetDlgItem
IsWindow
FindWindowExA
SendMessageTimeoutA
wsprintfA
ShowWindow
SetForegroundWindow
PostQuitMessage
SetWindowTextA
SetTimer
CreateDialogParamA
DestroyWindow
ExitWindowsEx
CharNextA
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
USER32.dll
SelectObject
SetTextColor
SetBkMode
CreateFontIndirectA
CreateBrushIndirect
DeleteObject
GetDeviceCaps
SetBkColor
GDI32.dll
MulDiv
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
FreeLibrary
LoadLibraryExA
GetModuleHandleA
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsA
lstrcmpA
lstrcmpiA
CloseHandle
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
SetFileAttributesA
GetTickCount
CreateFileA
GetFileSize
GetModuleFileNameA
ReadFile
GetCurrentProcess
CopyFileA
ExitProcess
SetEnvironmentVariableA
GetWindowsDirectoryA
GetTempPathA
GetCommandLineA
lstrlenA
GetVersion
SetErrorMode
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
GetLastError
CreateDirectoryA
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
WriteFile
lstrcpyA
MoveFileExA
lstrcatA
WideCharToMultiByte
GetSystemDirectoryA
GetProcAddress
GetExitCodeProcess
WaitForSingleObject
KERNEL32.dll
verifying installer: %d%%
unpacking data: %d%%
... %d%%
Installer integrity check has failed. Common causes include
incomplete download and damaged media. Contact the
installer's author to obtain a new copy.
More information at:
http://nsis.sf.net/NSIS_Error
Error writing temporary file. Make sure your temp folder is valid.
Error launching installer
SeShutdownPrivilege
NSIS Error
%u.%u%s%s
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VERSION
SHGetFolderPathA
SHFOLDER
SHAutoComplete
SHLWAPI
SHGetKnownFolderPath
SHELL32
InitiateShutdownA
RegDeleteKeyExA
ADVAPI32
GetUserDefaultUILanguage
GetDiskFreeSpaceExA
SetDefaultDllDirectories
KERNEL32
[Rename]
*?|<>/":
%s%s.dll
*XVRh270
haY;pjd~e^Z
yqgULH>
|qiBLHC
}|rUhhb
wn@}uokCFB
_\W{ph`Ckd\
RMBMnjbtljf
rjbi~si.
kc\\XWS
uxs{.34
w{ws$&)
xq[zso
niaM}vluj`
og_0b_X
w}x:y~z
lrl:msn
x|w;x|v
z}v=y|u
y|t>vzs
w{v?txt
surBoro
qupBmqm
osoBkol
gmiEdjf
ekgFbhd
gjgFdgd
dheGaeb
bhdH_ea
`fbH]c_
dieHafb
|{wWwws
xzvWtvr
vytWrup
tuoXpql
rrmXnnj
lqj[hlg
hnh[eke
did[_d_
xzu7CHG
~~x_/44
x}zI)-,
llgwCED
je^9~vpd
zunQ|ti"jbZ
daZ|npl
u|w^x~y
gmh_ntn
xyw#wzw
gjffx{w
ehegtxs
eifgrwr
`fbjkpl
^d`kgmi
_b`kili
\a_lejg
Z`]mbie
X^[mbhc
y~x4]da
npm{|}y
lok{y|w
jlg}wxs
hie}tup
{}uVV[Y
xwqWTYW
ssnYSYX
ilg[QWV
ruoXQVU
lql~szr
|t{HNM
hkgj=CC
z|xL154
xytx[][
<rrktde`
a]WAuqlr
|tQqib
|}z|inn
y{x}lqp
z}y~mtr
QLIuCCC
_a^uU[[
spkz)-.
xsk+ihc
y|u4y~}
rsl6w}{
jkf2v|{
sqlkjqq
~}z3trn
yxr)??=
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="*" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v3.06.1</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/></application></compatibility></assembly>
NullsoftInst
dJiiO0V
HX(G*]
@9V 6%yn
@2I#hJ
!robHUpIZ
NG>s:#
+q0(.}
C>B2."A
i^vB[L9
4T+Pt<
!B\(hFI
M{~LHp
!Yu+@
oMCnpK
uJ\ewX
4AYkF1T
zaO*0j
G97A+l
sgx,X{DQ
}F9saJ
30 c>}
Rm#"`{
muU^@j
.z&xY
`{:;}p
BC{t,~
+D:>b)g
!gt&>wdc4
dy{il:-
Ika}*\(
]1-1``l/
\*N'_lE?~
4[p:A#
:N@\&p
1]]!<"
V3* I:
=@H-02c
f8.:G
M>4Y0YZ
iT4;aRgq
mFZG}.
F)4f}H
n&~P4-
/!)B.>7
DBW5&hj
D@"]#C>
/G%o<d:i
T{LG<&
aKy34
{G4'G3
a(4,#p
Y]!k<g
_g,o'J
p_)b,1
hJa1Mp
wL,yY7
5aO;J?
q#G*GZ#{
5;gf;J
S1?Nj*6c
Yv<<-4
dT!^hT
9qB'"1eDtc
!NkH,M
{B)$&A
K1P8Q7
0O2qxj
'd9XvjC
:NQz7 Rs
LwY/j>
1u-;_j3
-({9BkK_
emmc#!
.QvWSm
?VcLWa{
h\aYex[2
@h8GG
\a'AVLm
Ejh ,
c#!8kmp
qNTNfX$
)~N46F2
jVJ%%@
V[zH14C!
xFqJPr
=CW,-g
RZf`,4z
Z~!!:2{@W%H
]jO)Efn
>m|\#s
fL ,<[
s)xRv;SG#
V.=&mQ
n-?\(=
IxGJnY
"LFwWG
!>e)%
$3J+}p
g1v`{#4Z
#>ewUK
-Ojvx:
SIXW6]y
&!8S}m
6p`{|F
SLlJb7
b*8`&u~
?f-#`(
D;xBV@
AFi|lO
Sz1Mt9
(pW;D;^L
]:4=K"
vKV)u)
yy<Uh~
/i^q0X
L#9[r(
r_`cd[
|"JvLb
;v,%/j
VkEz Pt
X^!7C9
jiSd004
uq;JZ,
a$s1i2
iiS0kf
y{x39 W
}k=K_$
!NI@L!
?C'&1v
l?5hA:
zJ&H3EI
Z=)5
*/W9q4
G4zi~F
HHh;"P
8zc1 m
&/1Z4q
/ 1GZT*
%<a3u*>
^8kC*DQ
Ea%#>F
_-K}]]
1}LL<}kV
79-Z`(0
_-fg)4Tf
3_C7]?
pF1 WD
\]rMh,o
]ul.gn
_KsXkQ
:<M17d
d<oojL
O+mg`F
Sj>H?!$vT
P[oA-hA
N"eQ]|
^#Ifo-
[HdQ|0
Oqr#t
kX&Jn?#
u&g]|:
:38IUI
JnhLtb
vg\EXR
JS]A_j
4OKem~$P
vw*Y49
\cghCC
S0+t>bG
N*[j8G
=!^Kw/dd
LmpR;w
FAm0evgY
JKoHk/
~}ORjS
{i4h7E
HnAw;b%
Y4798eoj
0W1<DUV5*
><8KR5
*#vT<=CK
OR+%!H
_O5sDM
k=%NC`
W{|FMt]
eFu %.R6
v/MJjO
OI'KSP5
g/Ch 4
6=Ri:z
bH.+SMc
P,;v\'
1pxU=(
:Yg'GE
U~%Dau
.7%Py>
klets
jOz\TTh
8J\Fop
r8MNe
xz7fTV
p~jI<L4d
dk#8@(
1M#.rQ
F3vfF97
5t88%U
k<Jxpw
wa1H6S
Nl&3?L
3QFS9J8B
IlSP>%
|o?gTsg!
ipU<^.
/+RSkp
WM:RJ=
>'o^ X
?$|8i@
>STUt#
4W{aJD
wX^`=i
<5>cq<
nQC?z"
I4F*$+nk
E^">H
tWiZ$G
/<&k]_sA
KL[t6,;
u0:}.[
f=7"r;
t[?qj[i
"f$x.
qkmcB3
-j;3uH
c!1V<-g3i
K $nu"b
\sBev&
)+1pquy
n%![lsA+
rYjH#2
JagZ:m
uyQsBR
ZC2xba
+PcnW"Or
$,mrnR
7_ftJX
9mg|y5^
));[CiI
t5>h2D
`SLO~S_s
$y=HgN
s#G1\U
s[{fxAq
T<H/Ez
d(ZS&6
-ILeyR
f^6AV6
ZZB"\u%
]I)}]Z
o<mJe[
ps)#Fel
qRD*wr
$$S5KH
}U!Ld-G0
`+Y}hc
,<oOJ}
*1v!)Ve
f1n;Pf+&
k$!#
hEqJ^{
i$W@1U
CL+XJ_b-`
>|oXaQdb
%u=twG
h5ZK"!_
nS\}ET
$wO<]10
)5(Nsl
Y28_2U
\p1<AX;
}3,A`c
[;n#FQ
A-7lL(
IfB@FmF
/)=QR7
<(@Vswo
m6?f*{
|YzH1~e
y8l'{.
KRPanY
=H/{92
Xt6MSw
btqJ3M
<V>#nPo;
HE3M[B
^ tXA"
C\#1iE
6tHr>0V
q2z*j2
Qp'T|c6
8!B\{}
'V3KyJ,
5(`buFb
+A;:SU
+a_KgUw,-
Ky0i0m
@E<{b~M2CU5w
~JAH+('
4=+wU4
XrO_mo
hg/?T'
/\9,Y+
2l#mtm
L!3QF<Z2
A:0JxHG
`$i#M6
(m+c*F
|J'q6R.
w:rq/1(
%KX#YP
8c-B-j
[u|WQ=cpe-
#yV?$<F
,qjW o
7CJVS\
`?j~"4{
ZIBo@M
8Z_j!g
5#Lh(R
D;/V6?
zs`,<W
g)5CX\
8jGK,pX|
|?i-2Q
b,s<q.
iA88&6C
$fpr~R;Cf
~Mea*
[GwL?-
>|TGe:i
TXv&`P
V|-}=&
rbZqI'
l4K]5|
d-]hB.}
a/;<7g
=B-G#\
zkZ>|VKo
k_$y&fX.
F;@0~a"
9/kG_O
=B.)-X
$f*1"m
i%f`0qZ
&OTrsP
$I86oc
ih*=yCC/?iz
xkpAUBAl
p153w<
{Xm1Qfm'_
hPDH+/
[a@s*j
u}XWnnb
?*V&Y3
c>g+q6
?%:`4ra
U3}-?OkI
V p,sv
7d|$-v
%+--7jl
E\veKw
ci [eN
99K,4A6
7?Md_6
<vg>9(
kUsUN_
-90p{
Px2,10
J'9^#=
(^7pdz0
Occitanie1
La Tour-du-Crieu1
Falsemaskinen1
Bandeng Agerhnernes 1)0'
Konstant@Udgangspunket.Fik0
230416034704Z
260415034704Z0
Occitanie1
La Tour-du-Crieu1
Falsemaskinen1
Bandeng Agerhnernes 1)0'
Konstant@Udgangspunket.Fik0
!B%2SBl
Occitanie1
La Tour-du-Crieu1
Falsemaskinen1
Bandeng Agerhnernes 1)0'
Konstant@Udgangspunket.Fik
DDxfZi
MS Shell Dlg
MS Shell Dlg
msctls_progress32
SysListView32
MS Shell Dlg
MS Shell Dlg
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Minix.4!c
tehtris Clean
DrWeb Clean
MicroWorld-eScan Gen:Variant.Jaik.156704
FireEye Generic.mg.dede170df1b43a3d
CAT-QuickHeal Clean
McAfee Artemis!DEDE170DF1B4
Malwarebytes Trojan.GuLoader.NSIS
VIPRE Gen:Variant.Jaik.156704
Sangfor Downloader.Win32.Minix.Vqts
K7AntiVirus Trojan ( 005a8dfe1 )
BitDefender Gen:Variant.Jaik.156704
K7GW Trojan ( 005a8dfe1 )
Cybereason Clean
BitDefenderTheta Clean
VirIT Clean
Cyren Clean
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 NSIS/Injector.BZL
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky HEUR:Trojan-Downloader.Win32.Minix.gen
Alibaba TrojanDownloader:Win32/Minix.a3816187
NANO-Antivirus Clean
ViRobot Clean
Rising Clean
Sophos Mal/Generic-S
F-Secure Clean
Baidu Clean
Zillya Clean
TrendMicro Trojan.Win32.GULOADER.YXDGUZ
McAfee-GW-Edition Artemis!Trojan
Trapmine Clean
CMC Clean
Emsisoft Gen:Variant.Jaik.156704 (B)
Ikarus Clean
GData Gen:Variant.Jaik.156704
Jiangmin Clean
Webroot W32.Malware.Gen
Google Clean
Avira Clean
MAX malware (ai score=87)
Antiy-AVL Clean
Gridinsoft Trojan.Win32.SmokeLoader.bot
Xcitium Clean
Arcabit Trojan.Jaik.D26420
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-Downloader.Win32.Minix.gen
Microsoft Trojan:Win32/Casdet!rfn
Cynet Malicious (score: 100)
AhnLab-V3 Downloader/Win.GuLoader.C5456833
Acronis Clean
VBA32 Clean
ALYac Gen:Variant.Jaik.156704
TACHYON Clean
DeepInstinct MALICIOUS
Cylance unsafe
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Win32.Trojan.FalseSign.Ychl
Yandex Clean
SentinelOne Clean
MaxSecure Clean
Fortinet Clean
AVG NSIS:MalwareX-gen [Trj]
Avast NSIS:MalwareX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.