Static | ZeroBOX

PE Compile Time

2023-08-30 22:13:21

PDB Path

F:\cproject\syscall\x64\Release\syscall.pdb

PE Imphash

46fac3f6a8e62adbf8207ee77ce0b9f9

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000193b0 0x00019400 6.28287180294
.rdata 0x0001b000 0x0000a658 0x0000a800 5.05315588861
.data 0x00026000 0x00003b68 0x00000c00 1.73000639209
.pdata 0x0002a000 0x00001074 0x00001200 4.89187402652
_RDATA 0x0002c000 0x000000fc 0x00000200 1.97379434731
.rsrc 0x0002d000 0x00009c73 0x00009e00 4.81442546876
.reloc 0x00037000 0x00000658 0x00000800 4.87208237161

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0002d140 0x000094a8 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x000365e8 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x000365fc 0x0000039c LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x00036998 0x000002db LANG_ENGLISH SUBLANG_ENGLISH_US ASCII text, with very long lines, with no line terminators

Imports

Library KERNEL32.dll:
0x14001b048 CloseHandle
0x14001b050 Process32FirstW
0x14001b058 Process32NextW
0x14001b060 GetLastError
0x14001b068 CreateToolhelp32Snapshot
0x14001b070 GetFileAttributesW
0x14001b078 WriteConsoleW
0x14001b080 RtlCaptureContext
0x14001b088 RtlLookupFunctionEntry
0x14001b090 RtlVirtualUnwind
0x14001b098 UnhandledExceptionFilter
0x14001b0a8 GetCurrentProcess
0x14001b0b0 TerminateProcess
0x14001b0c0 QueryPerformanceCounter
0x14001b0c8 GetCurrentProcessId
0x14001b0d0 GetCurrentThreadId
0x14001b0d8 GetSystemTimeAsFileTime
0x14001b0e0 InitializeSListHead
0x14001b0e8 IsDebuggerPresent
0x14001b0f0 GetStartupInfoW
0x14001b0f8 GetModuleHandleW
0x14001b100 RtlUnwindEx
0x14001b108 SetLastError
0x14001b110 EnterCriticalSection
0x14001b118 LeaveCriticalSection
0x14001b120 DeleteCriticalSection
0x14001b130 TlsAlloc
0x14001b138 TlsGetValue
0x14001b140 TlsSetValue
0x14001b148 TlsFree
0x14001b150 FreeLibrary
0x14001b158 GetProcAddress
0x14001b160 LoadLibraryExW
0x14001b168 RaiseException
0x14001b170 GetStdHandle
0x14001b178 WriteFile
0x14001b180 GetModuleFileNameW
0x14001b188 ExitProcess
0x14001b190 GetModuleHandleExW
0x14001b198 GetCommandLineA
0x14001b1a0 GetCommandLineW
0x14001b1a8 HeapAlloc
0x14001b1b0 HeapFree
0x14001b1b8 CompareStringW
0x14001b1c0 LCMapStringW
0x14001b1c8 GetFileType
0x14001b1d0 FindClose
0x14001b1d8 FindFirstFileExW
0x14001b1e0 FindNextFileW
0x14001b1e8 IsValidCodePage
0x14001b1f0 GetACP
0x14001b1f8 GetOEMCP
0x14001b200 GetCPInfo
0x14001b208 MultiByteToWideChar
0x14001b210 WideCharToMultiByte
0x14001b218 GetEnvironmentStringsW
0x14001b220 FreeEnvironmentStringsW
0x14001b228 SetEnvironmentVariableW
0x14001b230 SetStdHandle
0x14001b238 GetStringTypeW
0x14001b240 GetProcessHeap
0x14001b248 FlushFileBuffers
0x14001b250 GetConsoleOutputCP
0x14001b258 GetConsoleMode
0x14001b260 GetFileSizeEx
0x14001b268 SetFilePointerEx
0x14001b270 HeapSize
0x14001b278 HeapReAlloc
0x14001b280 CreateFileW
Library ADVAPI32.dll:
0x14001b000 CryptDestroyKey
0x14001b008 CryptAcquireContextW
0x14001b010 CryptDecrypt
0x14001b018 CryptCreateHash
0x14001b020 CryptDeriveKey
0x14001b028 CryptHashData
0x14001b030 CryptReleaseContext
0x14001b038 CryptDestroyHash

!This program cannot be run in DOS mode.
`.rdata
@.data
.pdata
@_RDATA
@.rsrc
@.reloc
L$ SVWH
=ntdlu
=l.dlt
fE9*uTE
H3E H3E
u0HcH<H
WATAUAVAWH
A_A^A]A\_
WATAUAVAWH
A_A^A]A\_
ffffff
fffffff
D8t$8t
D$@H;G
t(<#t
<htl<jt\<lt4<tt$<wt
t$ WAVAWH
<Ct-<D
<StW@:
<g~{<itd<ntY<ot7<pt
<utT@:
D<P0@:
k4+kP+
0A_A^_
x ATAVAWH
A_A^A\
x ATAVAWH
A_A^A\
UVWAVAWH
0A_A^_^]
WAVAWH
0A_A^_
u3HcH<H
t$ WAVAWH
A_A^_
WAVAWH
A_A^_
x AUAVAWH
@A_A^A]
WATAUAVAWH
A_A^A]A\_
L$ VWAVH
fD9t$b
@8l$Ht
L$ UVWH
WATAUAVAWH
gfffffffH
D8t$ht
A_A^A]A\_
x ATAVAWH
A_A^A\
u"8Z(t
uF8Z(t
vC8_(t
u"8Z(t
uF8Z(t
vB8_(t
UVWATAUAVAWH
`A_A^A]A\_^]
WATAUAVAWH
0A_A^A]A\_
H97u+A
\$ UVWATAUAVAWH
@8|$Ht
@8|$Ht
@8|$Ht
D$XD9x
@8|$ht
@8|$ht
@8|$ht
A_A^A]A\_^]
u"8Z(t
UVWATAUAVAWH
L$&8\$&t,8Y
@A_A^A]A\_^]
fD94Fu
UVWATAUAVAWH
xWI96tRI
0A_A^A]A\_^]
@UATAUAVAWH
e0A_A^A]A\]
\$ VWATAUAVH
D!l$xA
@A^A]A\_^
WAVAWH
A_A^_
UVWATAUAVAWH
D8\0>t
L$@D8]
A_A^A]A\_^]
VWATAVAW
A_A^A\_^
WATAUAVAWH
A_A^A]A\_
\$ UVWATAUAVAWH
H!D$ H
`A_A^A]A\_^]
WATAUAVAWH
A_A^A]A\_
WAVAWH
A_A^_
SUVWATAVAWH
A_A^A\_^][
@USVWATAVAWH
D8|$0A
A_A^A\_^[]
D$0H9D$8
ATAUAVH
L$ fff
L$ |+L;
A^A]A\
@UATAUAVAWH
H!T$0D
ue!T$(H!T$
A_A^A]A\]
UAVAWH
WATAUAVAWH
A_A^A]A\_
UVWAVAWH
@A_A^_^]
ffffff
fffffff
@USVWATAUAVAWH
e8A_A^A]A\_^[]
ATAVAWH
A_A^A\
USVWAVH
A^_^[]
LcA<E3
u HcA<H
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__swift_1
__swift_2
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
operator co_await
operator<=>
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
`anonymous namespace'
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
(null)
CorExitProcess
AreFileApisANSI
CompareStringEx
LCMapStringEx
LocaleNameToLCID
AppPolicyGetProcessTerminationMethod
NAN(SNAN)
nan(snan)
NAN(IND)
nan(ind)
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
[aOni*{
~ $s%r
@b;zO]
v2!L.2
1#QNAN
1#SNAN
UUUUUU
UUUUUU
=imb;D
/>58d%
VM>cQ6
>jtm}S
)>6{1n
+f)>0'
;H9>&X
*StO9>T
n03>Pu
K~Je#>!
bp(=>?g
BC?>6t9^
K&>.yC
.xJ>Hf
y\PD>!
|b=})>
c [1>H'
uzKs@>
3>N;kU
kE>fvw
V6E>`"(5
?UUUUUU
?7zQ6$
Failed in CryptAcquireContextW (%u)
Failed in CryptCreateHash (%u)
Failed in CryptHashData (%u)
Failed in CryptDeriveKey (%u)
Failed in CryptDecrypt (%u)
[!] Failed in sysNtCreateThreadEx (%u)
[!] Failed in sysNtWaitForSingleObject (%u)
vMsO=1g
F:\cproject\syscall\x64\Release\syscall.pdb
.text$mn
.text$mn$00
.text$x
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$voltmd
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata
.idata$2
.idata$3
.idata$4
.idata$6
.pdata
_RDATA
.rsrc$01
.rsrc$02
GetFileAttributesW
CreateToolhelp32Snapshot
GetLastError
Process32NextW
Process32FirstW
CloseHandle
KERNEL32.dll
CryptReleaseContext
CryptDestroyHash
CryptHashData
CryptDeriveKey
CryptCreateHash
CryptDecrypt
CryptAcquireContextW
CryptDestroyKey
ADVAPI32.dll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
GetProcessHeap
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
HeapSize
HeapReAlloc
CreateFileW
WriteConsoleW
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="XDCmake" type="win32"></assemblyIdentity><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"></supportedOS><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"></supportedOS></application></compatibility></assembly>
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 20110
220512204559Z
230511204559Z0t1
Washington1
Redmond1
Microsoft Corporation1
Microsoft Corporation0
cAv9Fc3
Microsoft Corporation1
230012+4705280
Chttp://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a
Ehttp://www.microsoft.com/pkiops/certs/MicCodSigPCA2011_2011-07-08.crt0
Ifs${z
5ZgjZv0
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20110
110708205909Z
260708210909Z0~1
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 20110
Ihttp://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl0^
Bhttp://www.microsoft.com/pki/certs/MicRooCerAut2011_2011_03_22.crt0
3http://www.microsoft.com/pkiops/docs/primarycps.htm0@
*?*kXIc
QEX82q'
WqVNHE
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 2011
http://www.microsoft.com0
Em-<^,
20230428214230.226Z0
Washington1
Redmond1
Microsoft Corporation1-0+
$Microsoft Ireland Operations Limited1&0$
Thales TSS ESN:FC41-4BD4-D2201%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
220920202217Z
231214202217Z0
Washington1
Redmond1
Microsoft Corporation1-0+
$Microsoft Ireland Operations Limited1&0$
Thales TSS ESN:FC41-4BD4-D2201%0#
Microsoft Time-Stamp Service0
Nhttp://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l
Phttp://www.microsoft.com/pkiops/certs/Microsoft%20Time-Stamp%20PCA%202010(1).crt0
[!01rt
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
210930182225Z
300930183225Z0|1
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
3http://www.microsoft.com/pkiops/Docs/Repository.htm0
Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
as.,k{n?,
Washington1
Redmond1
Microsoft Corporation1-0+
$Microsoft Ireland Operations Limited1&0$
Thales TSS ESN:FC41-4BD4-D2201%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
20230428193620Z
20230429193620Z0t0:
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
-Z}"^^
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 20110
220512204602Z
230511204602Z0t1
Washington1
Redmond1
Microsoft Corporation1
Microsoft Corporation0
.@F\j~
I0G1-0+
$Microsoft Ireland Operations Limited1
230012+4705300
Chttp://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a
Ehttp://www.microsoft.com/pkiops/certs/MicCodSigPCA2011_2011-07-08.crt0
8?M3#RX
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20110
110708205909Z
260708210909Z0~1
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 20110
Ihttp://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl0^
Bhttp://www.microsoft.com/pki/certs/MicRooCerAut2011_2011_03_22.crt0
3http://www.microsoft.com/pkiops/docs/primarycps.htm0@
*?*kXIc
QEX82q'
WqVNHE
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 2011
http://www.microsoft.com0
ucPs[w
20230428215347.405Z0
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1&0$
Thales TSS ESN:EACE-E316-C91D1%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
221104190129Z
240202190129Z0
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1&0$
Thales TSS ESN:EACE-E316-C91D1%0#
Microsoft Time-Stamp Service0
Nhttp://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l
Phttp://www.microsoft.com/pkiops/certs/Microsoft%20Time-Stamp%20PCA%202010(1).crt0
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
210930182225Z
300930183225Z0|1
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
3http://www.microsoft.com/pkiops/Docs/Repository.htm0
Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
as.,k{n?,
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1&0$
Thales TSS ESN:EACE-E316-C91D1%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
20230428193541Z
20230429193541Z0t0:
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
api-ms-
(null)
mscoree.dll
api-ms-win-core-datetime-l1-1-1
api-ms-win-core-file-l1-2-2
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
advapi32
api-ms-win-appmodel-runtime-l1-1-2
user32
ext-ms-
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
((((( H
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
CONOUT$
F:\qaxNB.dll
F:\qaxNBplus.dll
F:\qaxNBplus++.dll
WORD_1
VS_VERSION_INFO
StringFileInfo
040904B0
CompanyName
Microsoft Corporation
FileDescription
Microsoft
XML Document Contents Merge Tool
FileVersion
19.29.30151.0 built by: cloudtest
InternalName
XDCMAKE.EXE
LegalCopyright
Microsoft Corporation. All rights reserved.
OriginalFilename
XDCMAKE.EXE
ProductName
Microsoft
Visual Studio
ProductVersion
14.29.30151.0
VarFileInfo
Translation
Legal_policy_statement
bMicrosoft
Browse Information Maintenance Utilit
Legal_policy_statement
XMicrosoft
XML Document Contents Merge Tool
Antivirus Signature
Bkav Clean
Lionic Clean
tehtris Clean
DrWeb Clean
MicroWorld-eScan Generic.Trojan.Buggie.Marte.C.86071BAF
FireEye Generic.Trojan.Buggie.Marte.C.86071BAF
CAT-QuickHeal Clean
ALYac Clean
Cylance Clean
VIPRE Clean
Sangfor Clean
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Generic.Trojan.Buggie.Marte.C.86071BAF
K7GW Clean
K7AntiVirus Clean
BitDefenderTheta Clean
VirIT Clean
Cyren Clean
Symantec ML.Attribute.HighConfidence
Elastic malicious (moderate confidence)
ESET-NOD32 a variant of Win64/Agent_AGen.AKJ
APEX Clean
Paloalto Clean
Cynet Clean
Kaspersky UDS:Trojan.Win64.Shlem.jru
Alibaba Trojan:Win64/MalwareX.0e9818a8
NANO-Antivirus Clean
SUPERAntiSpyware Clean
Rising Trojan.Agent!8.B1E (CLOUD)
Sophos Mal/Generic-S
F-Secure Clean
Baidu Clean
Zillya Clean
Trapmine Clean
CMC Clean
Emsisoft Generic.Trojan.Buggie.Marte.C.86071BAF (B)
Ikarus Clean
GData Generic.Trojan.Buggie.Marte.C.86071BAF
Jiangmin Clean
Webroot Clean
Avira Clean
MAX malware (ai score=84)
Antiy-AVL Clean
Gridinsoft Trojan.Win64.CobaltStrike.bot
Xcitium Clean
Arcabit Generic.Trojan.Buggie.Marte.C.D15037BAF
ViRobot Clean
ZoneAlarm UDS:Trojan.Win64.Shlem.jru
Microsoft VirTool:Win32/Sysdupate.gen!D
Google Clean
AhnLab-V3 Clean
Acronis Clean
TACHYON Clean
Malwarebytes Malware.AI.4090400245
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
SentinelOne Clean
MaxSecure Clean
Fortinet Clean
DeepInstinct MALICIOUS
No IRMA results available.