Static | ZeroBOX

PE Compile Time

2023-06-27 04:48:12

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00028334 0x00028400 6.20828622252
.rsrc 0x0002c000 0x00000546 0x00000600 3.99259873053
.reloc 0x0002e000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0002c0a0 0x000002bc LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0002c35c 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
," 5`9
," 5n9
," lj9
,e lU9
," 4]9
0 219
 $19
KDBM('
\/o5
1SPS*
,* H<9
, ~?9
,& M?9
,& y>9
, 1>9
com.apple.Safari
Unable to resolve HTTP prox
tK``L~~L[[LwwL^^Ljjjj
!hipl*
^%wvos'
`]\EY
]L&tulp$
L}f3a`ye"1
$ERR~LL~ii~EE~ll~XXXX
.hgg.yy.\\4mmmm;pp;YY
XP\sQQH{nr
q#@8QK$!2O
]9#TXK'k{%
x> 77!vahk|gH.?>?>>?><!aemkI.'> 774x|.5:8v.5:8`gY.5> >?.Z@.}yaj`gY&.> ;!obbgtaC
9a~hwz}
@\EZGXR
4pfyts
`vkpkV
SN(!si
<D~ABW(WOBx
l]cse[
?)!-.12#!
iZC[PMQ_o
pQxji`uigW
'.(?)4
<JGbRPVgL
v-!nv<
~d1!n}<
+vtwV<VZ$
zx~cz~{x
qtqzusvnu
-9$?(.?$9
k9. ("
k'*"?%./.9
k8<$/%"
tqustorz
hwzrou~
~iX;hlt
wjp{z{l]>zlqimm
sqZ>miqzpwI$
?`P]UHRYXYN
XYXRYHDy
OKSXRUk$
\FMEMDmQ\A\FMLaX
(*,&.,
HuUODLDMdSNU@BHUODIUT`Q
+SDRVNSc
4#51)4
bekc`S{c{
lGC[PZ]c
]FURUg8
"%?:&x8?7>5/3=
%3583$303$
$3"#&;9
JCD_Y^
-/`"/|"/>cbw/{}jya`l"/
3,!)4.%$%2
4&/3/2#)
ZM[}tZM[_GZjyyt\FMKFM|
$& 3.5
%$5183"/
5-4 '$
r"IKM^CX
HIX\U^OBip
5K]QJLV]
4adl@dih
MRDYAEEWfFB[e
=+':': +*
'*+<-
+</9:(!
bL^udHOUNTXXzg
Y.--;,::27?3
SjafCkanbb`LSn}`kzJSbb`lcnz^Sj}nx{i`\
mw|kklz
4kgzK{mphll~Ozi~L
9kV|J^WPMM\j
}|SELIFORP|NOKLAF|
`A<;<{&09<3:'%
FOJELQsWQBWP
;jAADKBYXL
T1i28=5
PLBZZHY
G}+),*?vncq]gqcpjrqqcr]pgvqco$
fYHNTOUYY[f
1;,?;,:
++=*<<9
l8;?9l8;?9=8;?9j
+7$pgqump@"iamnD
.9/+3.
'~humii{j
(!$+"?=>?(>8!!,
Ec{|f}gkki
xyq}rnyoi
(k~knzzk
a6 ),#*75
0gqx}r{fdH?}gDH
cbw!|{az`llnS
Uyo{uzrs
@UI[1RLJrylS@yn}khzsO
)Bmywxpq}BWKY3PNHp{nQB{l
cqyuzfqga
>72=4)+)>(.
UD_]UB
o2";6!x
p3%8 $$6
pj2:69
09>##2$xx
xBN]H@]
x1`u`e]rrdbb@!udosduoH!du`whsQ]
kNfm{njlf~f!)%*6!71fnj
5zqgrvpzbz<*7/++9(zrv
s&&066
u!0;'0!;
u0!4#<'
""q"nyjnyO
T]ZW\P]V
GNIDOCNE
Gpsitvrakmhbka}
0gtdY^`)
[RWxG[u]WR\Kn
a`f{nl`c
j{nyf}
$'&! #
KO\q?*/e8.?"
#,=9-#
?a>f{`us}buZ4D@R
^HUMII[j
D@R`fuyG
PS$[N[^JJ[+
wbwrffw
zCTU_P\\^rAEw
0S#'5/ZEK
3P $6,YFH
ri&1"&1
'oz35(
VW@SW@VyW@QQ@buqcy
UBQUBT
KRdI^MI^H
cf0z|a~Q|kx|k}!2
e?)4,((:+
)>-)>(g
I.;.+??.
l6,7-!!
g='<&**
ZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZJZ@
h=) '::+
+</9:(!
yJnn|M
*tR5^D_EIIk
:L[HL[mnjsm
p"&&%=<
p'rrrprws
vtpz(,,/76
0&/*%,1
.&70:0!6
c$-*$"00&
c04,'-*
-,*01&
7-&116
c04,'-*
7%,0,1 *
&1"47%,
wY\TXp
4D4%)-
{{iX(;XGX
GQLTPPBs
0X]UYq
PGTPGq
^dn;-,;0*,?
;(7*=
*81-1,=7
;,?)*81
zQ|TXP]Vf
;9?5=?
1-;&>::(9*'0:
!M_SL_HjVS[WBU|fBU\UH_{f_H[MN\Uifh
hhoyec
hbRW_SFQxbFQXQL[
b[L_IJXQmbl{mkajp{llk}ag{uv
f`|iXdaiepgN
yWnljyd
kAG~|zitoHG
27?3&1
~3?,91,
2?+*,7
h4ntouyy[Fintouyy[F
}ni4ntouyy[F
5C[\@g
]`&1"&1
3:=9;7:
`tad.dnaw\liaM arepO\liaM arepO\
:;-9)8:*<=!zZ{[}]/., X#"%F'x(+Y6?>1032547|
ihkjmlo
DebxcyuuW
?k|ok|jzwoEZWOux|KE\KXNM_VJ
D}kvnjjxI
\FR1<$
8.YTLtsMFYTLv{
HF_H[MN\UI
v`}eaasB
=+6.**8
k+LZG_[[IxDGZ\FGk
kf~\@OA|
esnvrr`QmnsuonB
*sdwsdR]BOWsdfhU]ds`vugnR
ALTCPVNW~altCPVNw~C@T@
*@zdwssap
m`xO\ZB{
Q{4~y~9tyavec{bKTYAvec{BKvuau7tyabK
V@ILcHDWBJWu
f*9==/>
wP4649!
tPFOJeNBQDLQs
343t94,;(.6/
\JCFiBN]H@]
l:)--?.
v?y1/3!sde`nmovnEK
!}|yF*4(:h
~{uvtmu^P5
Ki)0?t).4/599;t)=43..?
.4/599
t)=43..?)t(?>;564-5>0t=(5
IAMBGOEB
:Fg`nm`Y
p: ;!--/r
IJFJQJWU
?X^fRV
Q^VSSVMK
>jpkq}}_
[9,)c,9,)
%.#(/&?":
%.#(/&?"
]*yorjnn|M~sX
X#9p|?
/9$(8"
-@KXWXZ]KVZJP]
'rb{vaHrzvyerdb
[:*3>)
;-0(,,>/
AdqdA%klbjIY
lLE@OF[y
aQDQtQDU]
)6iapm
-*,f|1-#
".'%'s' q!//#!/v%
qvp:'mq
c<$);e$)*'$/
.,Z*[)[([>*7}*F\/:osfW
W9>9~#5<96?"
IBTAECIQIB
6':?" } =<=4:
u195: ';<
Uiamb~i
Yhix|u~obi
2KUN?88}T%8:88}TVS
5]F700u\-0200u\^[
.T+1nfjeynx^5yi7
vj"5#'?"
p1"5 
15Z,T]SPEb
PCTA~mTCPFEW^b
(?)-5(
Y~-erd`xeU7zb~s~e^
=%949"
wbwR6dseCJ{c
Vv0y7"7
$3%!9$
,&>?")9
);RBEC
b#JKCEV`
K@KIKg
ZM[}tFGOIZltGLGEGk
~491<+4
n{nK/}j|ZSfkcnyfY
LOIRTIc
58" 7(3
pKsn{nK/}j|ZS}j|x`}M/vlnyf}_/lf
U>2>>2
mXUEBD
.\5%"$
r|32*22
!3:&:'6<
WhL[RQF]rhUXX]N[yh
~[xdjonL`dR
EK]FM]JKAZG{
S@$6&!'
"$}mjl
(\noeleM-K\
YN3#$"
&eH@RGeCEo
v^KIOICvKFFCPEgv
4zUEBD
$[LeQFWBt
,|XOFRETAw|
\UBOY^B}
TmI^SEB^am
4$.>9?
fsfcwwf
@QXQ_FQv
LYUJW^
]LQtik
!,KBE^X_XIXOC
VL>)%*%8")(%8/)&.#e
dia|fmlmzK({
E_UPSL
&fglNdmjmjbk@
pOmz{vipmO?zivkvrvmO?kyplpm|vR
S+<0?0-7<=
29T@]AAWQ]@bm
fqw~wa
Kornnx~romB/.stj
!< 60<!#$
UT]SP_tax
50b58447ge9`2,eb98,2be5,d64`,8`0e0`1c
"10":94u!:;u&<u2;<!<'
o]VGGZAD
G\]]RP
^RVAG`=
8c.e>$ZWj
9q<w,6iy`mZ
Q^WKLLZSLVZR^qXQVMKlZWKYPZEVl0
w*g,w8#w;6"&2w#89w$>w2->
w2?#w18w2->
61e@"(c`(08e(c8"}bqK}mtyN
.z7|/'>'ifos'ttbk'tn'bjfI`inusT'bos'ah'b}nT0
$kp$hequa$pkj$wm$aieJcjmvpW$alp$bk$a~mW8
@WJQv\QW@UJWuA@_LIDLW@v
j!"jrz'j!z`? 3
v4.0.30319
#Strings
#5[c
0 = W h }
!"A"J"s"
__StaticArrayInitTypeSize=10
__StaticArrayInitTypeSize=11
HMACSHA1
Nullable`1
IEnumerable`1
ICollection`1
IEnumerator`1
IList`1
get_Item1
HMACSHA512
__StaticArrayInitTypeSize=12
__StaticArrayInitTypeSize=32
Advapi32
kernel32
Microsoft.Win32
user32
ReadUInt32
ToUInt32
ReadInt32
ToInt32
KeyValuePair`2
Dictionary`2
get_Item2
Tuple`3
get_Item3
__StaticArrayInitTypeSize=24
__StaticArrayInitTypeSize=144
ToUInt64
ReadInt64
ToInt64
__StaticArrayInitTypeSize=84
__StaticArrayInitTypeSize=16
ReadUInt16
ToUInt16
ReadInt16
ToInt16
HMACSHA256
__StaticArrayInitTypeSize=6
5f9817f2-53a2-47be-a07a-a9ba4c06a9e7
get_UTF8
<Module>
get_FormatID
get_ASCII
System.IO
get_IV
set_IV
value__
ProtectedData
PropertyData
mscorlib
System.Collections.Generic
Microsoft.VisualBasic
WndProc
FromFileTimeUtc
get_Id
GetWindowThreadProcessId
GetProcessId
GetProcessById
OpenRead
SHA1Managed
RijndaelManaged
Interlocked
set_Enabled
add_Elapsed
get_IsInvalid
get_Guid
GetField
TrimEnd
ReadToEnd
Append
get_Second
get_Millisecond
GetUpperBound
GetLowerBound
set_Method
Clipboard
Replace
IdentityReference
set_Mode
FileMode
PaddingMode
CryptoStreamMode
CompressionMode
CipherMode
SelectSingleNode
XmlNode
get_Unicode
get_BigEndianUnicode
IsTextUnicode
VaultFree
FromImage
SendMessage
AddRange
CompareExchange
CredentialCache
EndInvoke
BeginInvoke
GetEnvironmentVariable
SetEnvironmentVariable
IEnumerable
IDisposable
ToDouble
get_Handle
RuntimeFieldHandle
SafeHandle
GetModuleHandle
RuntimeTypeHandle
ReleaseHandle
CreateHandle
GetTypeFromHandle
handle
Rectangle
ToSingle
DeleteFile
MoveFile
get_MainModule
ProcessModule
get_Name
get_FileName
set_FileName
GetModuleFileName
GetTempFileName
GetFileName
get_ModuleName
get_OSFullName
get_FullName
get_UserName
get_ComputerName
get_ProcessName
get_ProductName
GetProcessesByName
GetDirectoryName
FromFileTime
ToFileTime
DateTime
GetLastWriteTime
SetLastWriteTime
SetCreationTime
GetLastAccessTime
SetLastAccessTime
AppendLine
get_NewLine
Combine
LocalMachine
Escape
Unescape
DataProtectionScope
ValueType
SecurityProtocolType
GetType
FileShare
Compare
System.Core
PtrToStructure
get_InvariantCulture
Capture
HttpWebResponse
GetResponse
Dispose
Reverse
Create
MulticastDelegate
GetKeyboardState
GetKeyState
Delete
get_CanWrite
STAThreadAttribute
CompilerGeneratedAttribute
GuidAttribute
SecuritySafeCriticalAttribute
ExtensionAttribute
AssemblyFileVersionAttribute
FlagsAttribute
CompilationRelaxationsAttribute
ReliabilityContractAttribute
ParamArrayAttribute
RuntimeCompatibilityAttribute
SuppressUnmanagedCodeSecurityAttribute
set_UseShellExecute
get_Minute
ReadByte
ToByte
get_Value
get_HasValue
GetValue
GetPropertyValue
set_KeepAlive
Remove
5f9817f2-53a2-47be-a07a-a9ba4c06a9e7.exe
get_Size
get_HashSize
set_BlockSize
get_KeySize
Serialize
Deserialize
Initialize
SuppressFinalize
Resize
SizeOf
get_ItemOf
LastIndexOf
get_Jpeg
System.Threading
set_Padding
UTF8Encoding
GetEncoding
System.Drawing.Imaging
FromBase64String
ToBase64String
EscapeDataString
UnescapeDataString
GetPrivateProfileString
ToString
GetString
Substring
System.Drawing
get_Msg
ComputeHash
get_ExecutablePath
GetTempPath
GetFolderPath
get_Width
get_Length
SetLength
set_ContentLength
GetWindowTextLength
EndsWith
StartsWith
get_Month
PtrToStringUni
AsyncCallback
TransformFinalBlock
TransformBlock
get_CanSeek
AllocHGlobal
FreeHGlobal
Marshal
NetworkCredential
Decimal
System.Security.Principal
set_Interval
Rijndael
System.ComponentModel
Kernel32.dll
kernel32.dll
User32.dll
user32.dll
vaultcli.dll
psapi.dll
bcrypt.dll
System.Xml
set_SecurityProtocol
Control
FileStream
get_BaseStream
GetResponseStream
DeflateStream
CryptoStream
GetRequestStream
MemoryStream
get_LParam
get_WParam
get_Param
get_Item
set_Item
VaultGetItem
OperatingSystem
SymmetricAlgorithm
KeyedHashAlgorithm
Random
ICryptoTransform
ToBoolean
IsLittleEndian
CopyFromScreen
get_PrimaryScreen
ChangeClipboardChain
SeekOrigin
get_OSVersion
get_Version
System.IO.Compression
Application
get_Location
GetVolumeInformation
SystemInformation
System.Globalization
System.Web.Script.Serialization
System.Reflection
PropertyDataCollection
ValueCollection
MatchCollection
GroupCollection
ManagementObjectCollection
KeyCollection
get_Position
set_Position
SearchOption
Win32Exception
CryptographicException
ArgumentOutOfRangeException
InvalidOperationException
ArgumentException
get_StatusDescription
System.Runtime.ConstrainedExecution
StringComparison
Intern
CompareTo
CopyTo
ImageCodecInfo
FieldInfo
FileInfo
CultureInfo
FileSystemInfo
FileVersionInfo
GetVersionInfo
MemberInfo
ComputerInfo
get_StartInfo
ProcessStartInfo
GetLastInputInfo
DirectoryInfo
Bitmap
System.Linq
get_Year
ToChar
DirectorySeparatorChar
StreamReader
TextReader
BinaryReader
SHA1CryptoServiceProvider
MD5CryptoServiceProvider
RNGCryptoServiceProvider
TripleDESCryptoServiceProvider
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
IFormatProvider
StringBuilder
SpecialFolder
Encoder
Buffer
ServicePointManager
ManagementObjectSearcher
SecurityIdentifier
ElapsedEventHandler
ToUpper
CurrentUser
EncoderParameter
BitConverter
BinaryFormatter
SetClipboardViewer
ToLower
JavaScriptSerializer
get_Major
get_Minor
GetLastWin32Error
IEnumerator
ManagementObjectEnumerator
GetEnumerator
RandomNumberGenerator
.cctor
Monitor
CreateDecryptor
CreateEncryptor
ReadIntPtr
get_Hour
Graphics
System.Diagnostics
get_Bounds
Microsoft.VisualBasic.Devices
System.Runtime.InteropServices
System.Runtime.CompilerServices
GetInstances
get_ChildNodes
Matches
GetDirectories
get_Properties
ExpandEnvironmentVariables
GetFiles
EnumProcessModules
NumberStyles
GetSubKeyNames
ReadAllLines
Rfc2898DeriveBytes
ReadAllBytes
GetBytes
get_Values
ElapsedEventArgs
ICredentials
set_Credentials
get_DefaultCredentials
Equals
CreateParams
VaultEnumerateItems
System.Windows.Forms
Contains
System.Web.Extensions
System.Text.RegularExpressions
System.Collections
set_MaximumAutomaticRedirections
StringSplitOptions
RegexOptions
get_Groups
get_Chars
GetImageEncoders
System.Timers
RuntimeHelpers
EncoderParameters
ManagementClass
FileAccess
get_Success
GetCurrentProcess
VaultEnumerateVaults
set_Arguments
get_Exists
arrays
get_Keys
get_ModifierKeys
Concat
AppendFormat
ImageFormat
Subtract
ManagementBaseObject
ManagementObject
Collect
set_AllowAutoRedirect
Unprotect
System.Net
get_Height
op_Explicit
WaitForExit
VaultCloseVault
VaultOpenVault
get_Default
GetValueOrDefault
IAsyncResult
set_UserAgent
System.Management
XmlElement
Environment
XmlDocument
get_Parent
GetParent
get_Current
get_Count
get_TickCount
set_IterationCount
BCryptDecrypt
BCryptEncrypt
TrimStart
Convert
FtpWebRequest
HttpWebRequest
XmlNodeList
ToList
set_Timeout
GetKeyboardLayout
get_StandardOutput
set_RedirectStandardOutput
MoveNext
System.Text
ReadAllText
AppendAllText
get_InnerText
GetText
GetWindowText
get_Now
GetForegroundWindow
NativeWindow
set_CreateNoWindow
ToUnicodeEx
GetModuleFileNameEx
RegQueryValueEx
UnhookWindowsHookEx
SetWindowsHookEx
CallNextHookEx
RegOpenKeyEx
get_Day
ToByteArray
InitializeArray
ToArray
ToCharArray
Consistency
get_Key
set_Key
OpenSubKey
RegCloseKey
MapVirtualKey
ContainsKey
BCryptImportKey
BCryptDestroyKey
RegistryKey
System.Security.Cryptography
GetExecutingAssembly
Multiply
BlockCopy
System.Runtime.Serialization.Formatters.Binary
get_TotalPhysicalMemory
CreateDirectory
Registry
get_Capacity
Quality
op_Equality
op_Inequality
System.Security
IsNullOrEmpty
BCryptGetProperty
BCryptSetProperty
<PrivateImplementationDetails>{861AEB2F-6230-404F-862D-E34B71D1B1D3}
$1924157e-2039-4fa9-ad77-9fa74d4e7dc5
WrapNonExceptionThrows
1.0.0.0
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
pp p!p"p#p$p%p&p'p(p)p*p+p,p-p.p/p0p1p2p3p4p5p6p7p8p9p:p;p<p=p>p?p@pApDpEpFpGpHpKpe9q9
BACAIHJHUTVTWT[Zbadcecfcgchciclkrqsq}|~|
Accounts
logins
sha512
credential
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
FileVersion
1.0.0.0
InternalName
5f9817f2-53a2-47be-a07a-a9ba4c06a9e7.exe
LegalCopyright
OriginalFilename
5f9817f2-53a2-47be-a07a-a9ba4c06a9e7.exe
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.Common.C49E7D09
Lionic Trojan.Win32.Convagent.4!c
tehtris Clean
MicroWorld-eScan IL:Trojan.MSILZilla.24596
ClamAV Win.Packed.Generic-10003641-0
FireEye Generic.mg.fde1998a4f91b017
CAT-QuickHeal Clean
ALYac IL:Trojan.MSILZilla.24596
Malwarebytes Spyware.PasswordStealer.Generic
VIPRE IL:Trojan.MSILZilla.24596
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 005a7a471 )
BitDefender IL:Trojan.MSILZilla.24596
K7GW Trojan ( 005a7a471 )
Cybereason malicious.6f19e0
Baidu Clean
VirIT Trojan.Win32.MSIL_Heur.B
Cyren W32/MSIL_Kryptik.JRO.gen!Eldorado
Symantec ML.Attribute.HighConfidence
Elastic Windows.Trojan.AgentTesla
ESET-NOD32 a variant of MSIL/Spy.AgentTesla.F
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan-Downloader.MSIL.Convagent.gen
Alibaba TrojanDownloader:MSIL/AgentTesla.28bef523
NANO-Antivirus Trojan.Win32.Convagent.jyadyq
ViRobot Clean
Rising Spyware.AgentTesla!8.10E35 (TFE:D:OGwhyjPuqlH)
Emsisoft IL:Trojan.MSILZilla.24596 (B)
F-Secure Trojan.TR/AD.GenSteal.rgvba
DrWeb Clean
Zillya Trojan.AgentTesla.Win32.6622
TrendMicro TrojanSpy.Win32.NEGASTEAL.YXDF3Z
McAfee-GW-Edition BehavesLike.Win32.Generic.ch
Trapmine malicious.moderate.ml.score
CMC Clean
Sophos Troj/Steal-DJM
SentinelOne Static AI - Malicious PE
GData MSIL.Trojan.PSE.106B3WY
Jiangmin Clean
Webroot W32.Trojan.MSILZilla
Avira TR/AD.GenSteal.rgvba
MAX malware (ai score=84)
Antiy-AVL GrayWare/MSIL.Kryptik.AA
Gridinsoft Trojan.Win32.Agent.cl
Xcitium Malware@#2lmv705vfjjfr
Arcabit IL:Trojan.MSILZilla.D6014
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-Downloader.MSIL.Convagent.gen
Microsoft Trojan:MSIL/AgentTesla.RF!MTB
Google Detected
AhnLab-V3 Infostealer/Win.AgentTesla.C5356829
Acronis suspicious
McAfee Artemis!FDE1998A4F91
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Trojan.MSIL.AgentTesla.PInv.Heur
Cylance unsafe
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall TrojanSpy.Win32.NEGASTEAL.YXDF3Z
Tencent Trojan-PSW.MSIL.Stealer.kc
Yandex Clean
Ikarus Trojan.MSIL.Spy
MaxSecure Trojan.Malware.110445987.susgen
Fortinet MSIL/AgentTesla.F!tr
BitDefenderTheta Gen:NN.ZemsilF.36348.km0@aWxfC4b
AVG Win32:PWSX-gen [Trj]
Avast Win32:PWSX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.